33 "@type" : " SoftwareQualityIndicator" ,
44 "name" : " noLeakedCredentials" ,
55 "description" : " Checks if hardcoded secrets like passwords, API keys, and tokens is stored in the public git repository" ,
6- "keywords" : [" security" , " credential" , " leak" , " secret" , " password" ],
7- "url" : " " ,
8- "identifier" : {"@id" : " https://w3id.org/everse/i/indicators/no_leaked_credential" },
6+ "keywords" : [ " security" , " credential" , " leak" , " secret" , " password" ],
7+ "identifier" : { "@id" : " https://w3id.org/everse/i/indicators/no_leaked_credential" },
98 "status" : " Active" ,
109 "version" : " 1.0.0" ,
1110 "author" : {
1211 "@type" : " schema:Organization" ,
1312 "name" : " OpenSSF" ,
1413 "url" : " https://openssf.org/"
1514 },
16- "source" : {
17- "@id" : " https://www.bestpractices.dev/en/criteria/0#0.no_leaked_credentials" ,
18- "name" : " OpenSSF Best practice No Leaked Credentials"
19- },
15+ "source" : [
16+ {
17+ "@id" : " https://www.bestpractices.dev/en/criteria/0#0.no_leaked_credentials" ,
18+ "name" : " OpenSSF Best practice No Leaked Credentials"
19+ }
20+ ],
2021 "contact" : {
2122 "@type" : " schema:Person" ,
2223 "name" : " Tom François" ,
2324 "schema:email" : " tom.francois@lapp.in2p3.fr"
2425 },
25- "qualityDimension" : {"@id" : " https://w3id.org/everse/i/dimensions/security" }
26+ "qualityDimension" : { "@id" : " https://w3id.org/everse/i/dimensions/security" }
2627}
0 commit comments