Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improvement of OpenSSF Scorecard Score #3297

Open
2 of 3 tasks
harshitasao opened this issue Aug 10, 2024 · 3 comments
Open
2 of 3 tasks

Improvement of OpenSSF Scorecard Score #3297

harshitasao opened this issue Aug 10, 2024 · 3 comments

Comments

@harshitasao
Copy link
Contributor

harshitasao commented Aug 10, 2024

Hi, I'm Harshita. I’m working with CNCF and the Google Open Source Security Team for the GSoC 2024 term. We are collaborating to enhance security practices across various CNCF projects. The goal is to improve security for all CNCF projects by both using OpenSSF Scorecards and implementing its security improvements.

As this project already has scorecard action, I'm here to increase the final score by going over each check. I've listed all of the checks where work needs to be done, in order of its criticality. I plan to submit each PR for each fix. Please let me know what you think and for which ones a PR is welcome that I will submit it ASAP.

Current Score: 8.2

Scorecard report: https://scorecard.dev/viewer/?uri=github.com/falcosecurity/falco

Here's a few checks we can work on to improve the project's security posture:

  • Token-Permissions: Score = 0

    • The issue here is that many workflows doesn’t have a top-level read-only permissions block like present in the other workflows. Scorecard is quite severe in this check: a single workflow without top-level permissions gets a 0/10 for the check.
    • PR: fixed the token-permission and pinned-dependencies issue #3299
  • Pinned-Dependencies: Score = 7

    • Some github actions and container image in Dockerfile are not pinned by hash, which is resulting in a low score. But pinning container images would introduce the risk of outdated images.
    • Pinning dependencies to a specific hash rather than allowing mutable versions or ranges of versions improves supply chain security.
    • PR: fixed the token-permission and pinned-dependencies issue #3299
  • Fuzzing: Score = 0

    • Integrating the project with OSS-Fuzz by following the instructions here. The most difficult one on the list, maintainers help, is highly appreciated. For example, helping in identifying the components where fuzz testing will be added.
    • Issue: Add fuzz-testing #3304

/cc @joycebrum @diogoteles08 @pnacht @nate-double-u

@poiana
Copy link
Contributor

poiana commented Aug 10, 2024

There is not a label identifying the kind of this issue.
Please specify it either using /kind <group> or manually from the side menu.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@FedeDP
Copy link
Contributor

FedeDP commented Aug 27, 2024

For now,
/milestone 1.0.0

as this is a long-term work.

@poiana poiana added this to the 1.0.0 milestone Aug 27, 2024
@poiana
Copy link
Contributor

poiana commented Nov 25, 2024

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants