|
| 1 | +--- |
| 2 | +header: |
| 3 | + schema-version: 2.0.0 |
| 4 | + last-updated: '2026-04-06' |
| 5 | + last-reviewed: '2026-04-06' |
| 6 | + url: https://github.com/gemaraproj/go-gemara |
| 7 | + project-si-source: https://raw.githubusercontent.com/gemaraproj/.github/refs/heads/main/.github/security-insights.yml |
| 8 | + |
| 9 | +repository: |
| 10 | + url: https://github.com/gemaraproj/go-gemara |
| 11 | + status: active |
| 12 | + accepts-change-request: true |
| 13 | + accepts-automated-change-request: true |
| 14 | + core-team: |
| 15 | + - name: Eddie Knight |
| 16 | + affiliation: Sonatype |
| 17 | + email: knight@linux.com |
| 18 | + - name: Jenn Power |
| 19 | + affiliation: Red Hat |
| 20 | + email: barnabei.jennifer@gmail.com |
| 21 | + primary: true |
| 22 | + documentation: |
| 23 | + contributing-guide: https://github.com/gemaraproj/gemara/blob/main/CONTRIBUTING.md |
| 24 | + license: |
| 25 | + url: https://github.com/gemaraproj/go-gemara?tab=Apache-2.0-1-ov-file#readme |
| 26 | + expression: Apache-2.0 |
| 27 | + security: |
| 28 | + assessments: |
| 29 | + self: |
| 30 | + comment: | |
| 31 | + Self assessment has not yet been completed. |
| 32 | + tools: |
| 33 | + - name: Dependabot |
| 34 | + type: SCA |
| 35 | + version: "2" |
| 36 | + rulesets: |
| 37 | + - built-in |
| 38 | + results: |
| 39 | + adhoc: |
| 40 | + name: Scheduled SCA Scan Results |
| 41 | + predicate-uri: https://docs.github.com/en/graphql/reference/objects#repositoryvulnerabilityalert |
| 42 | + location: https://github.com/gemaraproj/go-gemara/security/dependabot |
| 43 | + comment: | |
| 44 | + Dependabot runs every Monday. |
| 45 | + The configuration can be found here: https://github.com/gemaraproj/go-gemara/blob/main/.github/dependabot.yaml |
| 46 | + integration: |
| 47 | + adhoc: true |
| 48 | + ci: false |
| 49 | + release: false |
| 50 | + - name: CodeQL |
| 51 | + type: SAST |
| 52 | + version: "2.y.z" |
| 53 | + rulesets: |
| 54 | + - go |
| 55 | + - actions |
| 56 | + results: |
| 57 | + adhoc: |
| 58 | + name: Scheduled SAST Results |
| 59 | + predicate-uri: https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/schemas/sarif-schema-2.1.0.json |
| 60 | + location: https://github.com/gemaraproj/go-gemara/security/code-scanning |
| 61 | + comment: | |
| 62 | + The results of the scheduled SAST scan are available in the Code Scanning tab of the Security Insights page and as an artifact on the scheduled job. |
| 63 | + ci: |
| 64 | + name: CI SAST Results |
| 65 | + predicate-uri: https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/schemas/sarif-schema-2.1.0.json |
| 66 | + location: https://github.com/gemaraproj/go-gemara/security/code-scanning |
| 67 | + comment: | |
| 68 | + The results of the CI SAST scan are available in the Code Scanning tab of the Security Insights page. |
| 69 | + integration: |
| 70 | + adhoc: true |
| 71 | + ci: true |
| 72 | + release: false |
| 73 | + - name: Kusari Inspector |
| 74 | + type: other |
| 75 | + rulesets: |
| 76 | + - default |
| 77 | + comment: | |
| 78 | + Kusari Inspector is set up to scan on pull request submissions. |
| 79 | + It analyzes dependency changes, licenses, vulnerabilities, code security, |
| 80 | + and workflow risks, posting results as PR comments via the GitHub App. |
| 81 | + results: |
| 82 | + ci: |
| 83 | + name: CI Scan Results |
| 84 | + predicate-uri: https://docs.kusari.cloud/Inspector/integrations/github |
| 85 | + location: https://github.com/gemaraproj/go-gemara/pulls |
| 86 | + integration: |
| 87 | + adhoc: false |
| 88 | + ci: true |
| 89 | + release: false |
0 commit comments