Skip to content

Commit 91939d8

Browse files
authored
Merge pull request #44 from dgarijo/main
homogenized descriptions
2 parents 5d03624 + b052cab commit 91939d8

3 files changed

Lines changed: 23 additions & 13 deletions

File tree

indicators/codemeta_completeness.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,26 @@
22
"@context": "https://w3id.org/everse/rsqi#",
33
"@id": "https://w3id.org/everse/i/indicators/codemeta_completeness",
44
"@type": "SoftwareQualityIndicator",
5-
"name": "CodeMeta Completeness",
6-
"description": "Completeness of a codemeta.json file",
5+
"name": "CodeMeta completeness",
6+
"description": "Indicator that checks the completeness of a codemeta.json file, i.e., the percentage of properties that are filled with metadata. This indicator does not assess the quality of the metadata fields available.",
77
"keywords": [ "codemeta", "metadata", "fair" ],
88
"identifier": { "@id": "https://w3id.org/everse/i/indicators/codemeta_completeness" },
99
"status": "Active",
1010
"version": "1.0.0",
11-
"author": {
11+
"author": [
12+
{
1213
"@type": "schema:Person",
1314
"name": "Thomas Vuillaume"
1415
},
16+
{
17+
"@type": "schema:Person",
18+
"name": "Daniel Garijo"
19+
}
20+
],
21+
"contact": {
22+
"@type": "Person",
23+
"name": "Thomas Vuillaume"
24+
},
1525
"qualityDimension": { "@id": "https://w3id.org/everse/i/dimensions/fairness" },
1626
"created": "20-03-2025"
1727
}

indicators/no_critical_vulnerability.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
{
22
"@context": "https://w3id.org/everse/rsqi#",
33
"@type": "SoftwareQualityIndicator",
4-
"name": "noCriticalVulnerability",
5-
"description": "Checks if reported critical vulnerabilities has been fixed",
4+
"name": "No critical vulnerabilities",
5+
"description": "Checks if reported critical vulnerabilities have been fixed",
66
"keywords": [ "security", "critical", "vulnerability" ],
77
"identifier": { "@id": "https://w3id.org/everse/i/indicators/no_critical_vulnerability" },
88
"status": "Active",
99
"version": "1.0.0",
10-
"author": {
10+
"author": [{
1111
"@type": "schema:Organization",
1212
"name": "OpenSSF",
1313
"url": "https://openssf.org/"
14-
},
14+
}],
1515
"source": [
1616
{
1717
"@id": "https://www.bestpractices.dev/en/criteria/0#0.vulnerabilities_critical_fixed",
@@ -25,4 +25,4 @@
2525
},
2626
"qualityDimension": { "@id": "https://w3id.org/everse/i/dimensions/security" },
2727
"created": "03-04-2025"
28-
}
28+
}
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
{
22
"@context": "https://w3id.org/everse/rsqi#",
33
"@type": "SoftwareQualityIndicator",
4-
"name": "noLeakedCredentials",
4+
"name": "No leaked credentials",
55
"description": "Checks if hardcoded secrets like passwords, API keys, and tokens is stored in the public git repository",
66
"keywords": [ "security", "credential", "leak", "secret", "password" ],
7-
"identifier": { "@id": "https://w3id.org/everse/i/indicators/no_leaked_credential" },
7+
"identifier": { "@id": "https://w3id.org/everse/i/indicators/no_leaked_credentials" },
88
"status": "Active",
99
"version": "1.0.0",
10-
"author": {
10+
"author": [{
1111
"@type": "schema:Organization",
1212
"name": "OpenSSF",
1313
"url": "https://openssf.org/"
14-
},
14+
}],
1515
"source": [
1616
{
1717
"@id": "https://www.bestpractices.dev/en/criteria/0#0.no_leaked_credentials",
@@ -24,4 +24,4 @@
2424
"schema:email": "tom.francois@lapp.in2p3.fr"
2525
},
2626
"qualityDimension": { "@id": "https://w3id.org/everse/i/dimensions/security" }
27-
}
27+
}

0 commit comments

Comments
 (0)