Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable OpenSSF Scorecard code scanning alert and badge #595

Merged
merged 3 commits into from
Sep 13, 2022
Merged

Enable OpenSSF Scorecard code scanning alert and badge #595

merged 3 commits into from
Sep 13, 2022

Conversation

joycebrum
Copy link
Contributor

Hi @mihaimaruseac, I am Joyce Brum, from Google, and I would like to suggest the use of the OpenSSF Scorecard for your project.

The OpenSSF Scorecard is a tool to search and manage security risks in the repository processes, it is developed by the OpenSSF, a non-profitable foundation dedicated to improve the overall security of the open source comunity.

The main benefit of the Scorecard is the automatic checks (you can see more about which checks are made and why in https://securityscorecards.dev/#the-checks) that help you track security vulnerabilities and how to manage or solve them.

Besides that, there is a badge that are completely optional (which I've added in the README file), but that can be a very useful way to show your commitment to secure practice, please have a look on Show Off Your Security Score: Announcing Scorecards Badges to better understand of the advantages of the badge.

Please, feel free to reach me out in case of any doubt.

@mihaimaruseac
Copy link
Owner

Hello :)

Thank you very much. I will review the PR and merge it shortly

I'm also looking at how best to add SLSA attestations (based on https://github.com/mihaimaruseac/slsa-lvl3-generic-provenance-in-haskell-example and https://github.com/slsa-framework/slsa-github-generator where I've worked on some issues) but first need to improve the CI with GitHub Actions :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants