-
Notifications
You must be signed in to change notification settings - Fork 496
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Explicitly allowed action permissions? #2338
Comments
Facing the same issue, though I have two actions that were caught by the same check: one from helm, and one from a community creator. Perhaps we can publish a vetting policy to add trusted actions to the allowlist? This policy should clearly articulate what standard an action is being held to, so that PRs can be made by folks such as Justin & myself to add such actions to the allowlist. |
I think the token permission check should not ding for using explicit If one uses But the use of a specific I have similar issue for some of our workflows, where the token permission score is 0, even though the permissions are least privilege. Given that there are over 10K GitHub Actions in the marketplace, I don't think it is feasible to create a "safe" list and keep it updated. Instead my recommendation is that if there is |
I like this idea. @ossf/scorecard-maintainers Thoughts? |
+1 maintaining an allowlist doesn't scale. And if the only criterion to being added to the list is sending a PR, then the score difference ends up measuring that effort instead of any security posture. I can see the original intent, as some write permissions are more dangerous than others. If we remove the score penalty, I think there is still value to having a warning in the output. |
The code is in place right now for whitelisting. We can scrap that code and move to a wholesale "check it yourself" if we want, but I'm not in a position to make that decision. Whatever we do, it's somewhat time sensitive because we have several CNCF project working on the Security Slam now through next week. It would be really nice to allow some of these projects to get to 100% without scrapping their existing workflows (unless we do find something insecure). My proposal is that we create a simple docs entry outlining the process for getting an action approved (or just a link to this doc), then encourage Scorecard users to create an issue and/or PR with evidence to accelerate vetting from a code reviewer. |
I'm ok with scrapping the allowlist and simply showing a warn without a deduction in points. I think that's majority votes (me, Spencer and Naveen) to scrap this. So ok to proceed here. If anyone wants to send a PR for this happy to get this reviewed and merged. |
I'm looking into this today, with an aim to add a check warning to jobs that contain write permission without deducting points. |
Created the PR linked above to specifically address jobs using I noticed that Chaos Mesh is using |
- New release to address the issue ossf/scorecard#2338 Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>
- New release to address the issue ossf/scorecard#2338 Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>
- New release to address the issue ossf/scorecard#2338 Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>
- New release to address the issue ossf/scorecard#2338 Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com> Signed-off-by: naveensrinivasan <172697+naveensrinivasan@users.noreply.github.com>
We also encountered the need for explicit We need this as a requirement for https://github.com/fkirc/skip-duplicate-actions#usage-examples |
Added a PR to address Chaos Mesh & K8gb requirements... recommend reopening this issue if we need more discussion on the topic. |
I think the same change should be made for all other permission scopes as well e.g security-events, checks etc. |
Looks like we also need |
Looks like this issue hasn't been fully addressed: systemd/systemd#25042 (comment) |
Thanks for the updates, it seems only the |
I'm not sure "contents" works. As far as I can see |
I will need to double check how the code-scanning reports are generated then. As we still |
It seems to be the case. What's weird though is that
but the alerts end up being "high severity" in the dashboard but it's probably a separate issue. |
@spencerschrock looking at #2991 I think it would be really nice if the scorecard project can decide what it's trying to accomplish. If scorecard has the resources to actually continuously audit stuff and decide what is safe I think it should go with #2991. |
I guess once it's decided where dashboards should officially live it should be possible to get rid of those alerts by just cutting off the SARIF part of the scorecard action. Without dashboards alerts kind of help to make sense of the scorecard output but with dashboards where the results are beautifully displayed those alerts popping up over and over again are pointless. (The SARIF part would make sense though if the action could be run on PRs but I don't think it's ever going to happen). |
Stale issue message - this issue will be closed in 7 days |
This issue is stale because it has been open for 60 days with no activity. |
This issue has been marked stale because it has been open for 60 days with no activity. |
Hello.
I'm trying to max out my score for the scorecard, especially in the security section. One of the issues I'm running into is that I use the google release-please action to cut releases and then push those tags back into the repo. Currently, there is no mechanism to explicitly mark that action as "safe".
I would like to check in a yaml file into my repository which says "I really do trust the following actions" and not have to specify a sha / version.
Alternatively, we can update your tool to also say "release-please is safe".
The text was updated successfully, but these errors were encountered: