Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add the OpenSSF Scorecard Github Action #130

Closed
joycebrum opened this issue Sep 14, 2022 · 0 comments · Fixed by #131
Closed

Add the OpenSSF Scorecard Github Action #130

joycebrum opened this issue Sep 14, 2022 · 0 comments · Fixed by #131
Assignees

Comments

@joycebrum
Copy link
Contributor

joycebrum commented Sep 14, 2022

Hi! I'm here on behalf of Google, working to improve the supply-chain security of open-source projects. I would like to suggest the adoption of the Scorecard in your repository.

The Scorecard system combines dozens of automated checks to let maintainers better understand their project's supply-chain security posture. It is developed by the OpenSSF, a non-profit foundation dedicated to improving the security of the open-source community.

Considering that Tensorflow is a community group and receives contribution from the community itself, the Scorecard could help to garantee that the repository and the contribution process is safe from malicious sabotage.

With that in mind and to make the process easier to replicate in github projects, the OpenSSF has also developed the Scorecard GitHub Action, which adds the results of its checks to the project's security dashboard, as well as suggestions on how to solve any issues (see examples below). This Action has been adopted by 1600+ projects already.

More about Scorecard Github Action, please check Reducing security risk in open source software with GitHub Actions and OpenSSF Scorecards V4

Would you be interested in a PR which adds this Action? Optionally, it can also publish your results to the OpenSSF REST API, which allows a badge with the project's score to be added to its README.

Code scanning dashboard with multiple alerts, including Code-Review and Token-Permissions

Detail of a Token-Permissions alert, indicating the specific file and remediation steps

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants