|
| 1 | +# gittuf incubation application |
| 2 | + |
| 3 | +## Project has met all Sandbox requirement |
| 4 | + |
| 5 | + * Sandbox PR: https://github.com/ossf/tac/pull/198 |
| 6 | + * Sandbox Licensing and DD PR: https://github.com/ossf/tac/pull/199 |
| 7 | + * Sandbox Document: https://github.com/ossf/tac/blob/main/process/project-lifecycle-documents/gittuf_sandbox_stage.md |
| 8 | + |
| 9 | +## List of project maintainers |
| 10 | + |
| 11 | +The project must have a minimum of three maintainers with a minimum of two different organizational affiliations. |
| 12 | + * Aditya Sirish A Yelgundhalli, New York University / Bloomberg, adityasaky |
| 13 | + * Billy Lynch, Chainguard, wlynch |
| 14 | + * Patrick Zielinski, New York University, patzielinski |
| 15 | + * Reza Curtmola, New Jersey Institute of Technology, reza-curtmola |
| 16 | + * Justin Cappos, New York University, JustinCappos |
| 17 | + * Neil Naveen, Independent, neilnaveen |
| 18 | + |
| 19 | +## Mission of the project |
| 20 | + |
| 21 | +Source code is typically stored in a version control system, of which the most |
| 22 | +popular is Git. To prevent software supply chain attacks that tamper with source |
| 23 | +code, it's common to use access control policies (e.g., the developers trusted |
| 24 | +to make changes to a branch in the repository, the number of review approvals |
| 25 | +required for changes). Such policies are typically enforced by _source control |
| 26 | +platforms_ (SCP). However, these platforms become a single point of trust; a |
| 27 | +compromised SCP can undermine the security controls configured for the |
| 28 | +repository. gittuf's mission is to make Git security policies _independently |
| 29 | +verifiable / enforceable_, thereby removing the SCP as a fully trusted entity in |
| 30 | +the supply chain. |
| 31 | + |
| 32 | +## Project adoption |
| 33 | + |
| 34 | +gittuf has recently reached a beta release. We've been collaborating with |
| 35 | +industry and open source projects to run gittuf pilots to improve the system's |
| 36 | +guarantees and user experience. |
| 37 | + |
| 38 | +### Bloomberg |
| 39 | + |
| 40 | +Bloomberg is currently running a pilot of gittuf. |
| 41 | + |
| 42 | +> Dennis Roellke, a security architect at Bloomberg, is leading a Gittuf pilot |
| 43 | +project in various departments of the financial news and information company. |
| 44 | +His primary job responsibility is to ensure the integrity of the software supply |
| 45 | +chain throughout different groups. |
| 46 | +> |
| 47 | +> [...] |
| 48 | +> |
| 49 | +> Roellke said his team is continuing to scale up its Gittuf interfaces for use |
| 50 | +by larger and more varied teams of engineers inside Bloomberg. |
| 51 | + |
| 52 | +Source: https://news.njit.edu/cybersecurity-researcher-njit-toughens-git-software-repositories |
| 53 | + |
| 54 | +### Open Source Projects |
| 55 | + |
| 56 | +Other projects in the software supply chain security space have begun piloting |
| 57 | +gittuf. |
| 58 | + |
| 59 | +#### GUAC |
| 60 | + |
| 61 | +The GUAC project, incubated at the OpenSSF, has started using gittuf via the |
| 62 | +GitHub app on their [documentation |
| 63 | +repository](https://github.com/guacsec/guac-docs) to record pull request |
| 64 | +approval and merge attestations. Example: |
| 65 | +https://github.com/guacsec/guac-docs/pull/203#issuecomment-2898386819 |
| 66 | + |
| 67 | +#### in-toto |
| 68 | + |
| 69 | +The in-toto project, a graduated project at the CNCF, has been dogfooding gittuf |
| 70 | +in the [attestation-verifier |
| 71 | +repository](https://github.com/in-toto/attestation-verifier) for a year. The |
| 72 | +project recently switched over to using the gittuf GitHub app. Example: |
| 73 | +https://github.com/in-toto/attestation-verifier/pull/77#issuecomment-2901762106 |
| 74 | + |
| 75 | +#### Chainsights |
| 76 | + |
| 77 | +Kusari's open source [chainsights](https://github.com/kusari-oss/chainsights) |
| 78 | +repository is part of the gittuf GitHub app pilot. |
| 79 | + |
| 80 | +#### SLSA |
| 81 | + |
| 82 | +gittuf is closely aligned with the upcoming SLSA source track. Work is underway |
| 83 | +to allow gittuf to be used to achieve SLSA source level 3. The draft SLSA source |
| 84 | +track specification lists gittuf as a way to enforce change management process. |
| 85 | + |
| 86 | +> Enforcement of the organization-defined technical controls could be |
| 87 | +accomplished by, for example: |
| 88 | +> - The configuration of branch protection rules (e.g.GitHub, GitLab) which |
| 89 | +> require additional checks to ‘pass’ (e.g. unit tests, linters), or |
| 90 | +> - the application and verification of gittuf policies, or |
| 91 | +> - some other mechanism as enforced by the Change management tool. |
| 92 | +
|
| 93 | +Source: https://slsa.dev/spec/draft/source-requirements |
| 94 | + |
| 95 | +## Governance |
| 96 | + |
| 97 | +Project must have met publicly at least 5 times in the last quarter since becoming Sandbox |
| 98 | + * [2025 Notes](https://docs.google.com/document/d/1EbFAZu_pxayLwr4QWxhKCSZYhyJAcya7K-b_kuXlmpU/edit?tab=t.0) |
| 99 | + * [2024 Notes](https://docs.google.com/document/d/1tXFCVUHsICLpLKxcGvhzBDUWmpsY1LQvysFaX6AJRkk/edit?tab=t.0) |
| 100 | + |
| 101 | +Projects must have documented, initial project governance |
| 102 | + * https://github.com/gittuf/community/blob/main/CHARTER.md |
| 103 | + |
| 104 | +Project must have defined Contributor Guide |
| 105 | + * https://github.com/gittuf/gittuf/blob/main/CONTRIBUTING.md |
| 106 | + |
| 107 | +Project has attained an OpenSSF Best Practice Badge at "passing" level |
| 108 | + * https://www.bestpractices.dev/en/projects/7789 |
| 109 | + |
| 110 | +Project is integrated into the OpenSSF Scorecard |
| 111 | + * https://scorecard.dev/viewer/?uri=github.com%2Fgittuf%2Fgittuf |
| 112 | + |
| 113 | +## IP policy and licensing due diligence |
| 114 | + |
| 115 | +Not applicable now, completed when entering OpenSSF sandbox, tracked in |
| 116 | +https://github.com/ossf/tac/issues/199. |
| 117 | + |
| 118 | +The gittuf implementation is licensed under Apache 2.0. Source: |
| 119 | +https://github.com/gittuf/gittuf/blob/main/LICENSE |
| 120 | + |
| 121 | +## Security Baseline |
| 122 | + |
| 123 | +The project meets all applicable Security Baseline requirements: |
| 124 | + * [x] [Security Baseline - Once Sandbox](https://github.com/ossf/tac/blob/main/process/security_baseline.md#security-baseline---once-sandbox) |
| 125 | + * [x] [Security Baseline - To Become Incubating](https://github.com/ossf/tac/blob/main/process/security_baseline.md#security-baseline---to-become-incubating) |
| 126 | + |
| 127 | +## Project References |
| 128 | + |
| 129 | +The project should provide a list of existing resources with links to the repository, website, a roadmap, contributing guide, demos and walkthroughs, and any other material to showcase the existing breadth, maturity, and direction of the project. |
| 130 | + |
| 131 | +| Reference | URL | |
| 132 | +|-----------------------|-----| |
| 133 | +| Repo | https://github.com/gittuf/gittuf | |
| 134 | +| Meeting Agenda | https://docs.google.com/document/d/1EbFAZu_pxayLwr4QWxhKCSZYhyJAcya7K-b_kuXlmpU/edit?tab=t.0 | |
| 135 | +| OSSF Calendar Entry | https://openssf.org/getinvolved/ | |
| 136 | +| Website | https://gittuf.dev | |
| 137 | +| Contributing guide | https://github.com/gittuf/gittuf/blob/main/CONTRIBUTING.md | |
| 138 | +| Security.md | https://github.com/gittuf/gittuf/blob/main/SECURITY.md | |
| 139 | +| Roadmap | https://github.com/gittuf/gittuf/blob/main/docs/roadmap.md | |
| 140 | +| Demos | https://github.com/gittuf/demo | |
| 141 | +| Best Practices Badge | https://www.bestpractices.dev/en/projects/7789 | |
| 142 | +| Scorecard integration | https://scorecard.dev/viewer/?uri=github.com%2Fgittuf%2Fgittuf | |
| 143 | +| Talks | https://www.youtube.com/watch?v=eCSeIEdMbCw&pp=ygUGZ2l0dHVm, https://www.youtube.com/watch?v=5bWpeZNK00Q&pp=ygUGZ2l0dHVm | |
| 144 | +| Misc. Coverage | https://lwn.net/Articles/972467/ | |
| 145 | +| Research Paper | https://www.ndss-symposium.org/ndss-paper/rethinking-trust-in-forge-based-git-security/ | |
0 commit comments