-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review Secure Development Knowledge in community #42
Comments
Each component should have a maintainer familiar with the content listed in this issue. |
@confidential-containers/attestation-agent-maintainers |
|
@arronwy do you satisfy these criteria for image-rs & ocicrypt-rs? |
With 3 of us responding, I've updated the badge to reflect we are meeting this requirement. |
@dcmiddle is this issue still relevant or can be closed? |
I think we covered our bases for v0.1. |
@dcmiddle do you think this can converge for the V0.3.0 release? |
Thanks for the ping @ariel-adam .. I added a call for security champions for the remaining components to the community agenda 12/18. |
@dcmiddle can I move this issue into progress? |
Do you feel this is still on track for V0.3.0 or should we role this to the next release? |
Complete for all components designated for v0.3. Badge updated. Should we add new components we can reopen this. |
From https://bestpractices.coreinfrastructure.org/en/projects/5719#security
Additionally from
Other security issues
in the same section...Review these topics in the community. Consider using asynchronous means like acknowledgement of this issue or discussion in a community meeting.
The text was updated successfully, but these errors were encountered: