Skip to content

Commit 110bffc

Browse files
feat: add security-insights.yml for OSPS baseline scanning (#50)
* feat: add security-insights.yml for OSPS baseline scanning Signed-off-by: sonupreetam <spreetam@redhat.com> * fix: reduce core-team Signed-off-by: sonupreetam <spreetam@redhat.com> * fix: add missing YAML document start marker Signed-off-by: sonupreetam <spreetam@redhat.com> * feat: add Kusari Inspector security-insights entry Signed-off-by: sonupreetam <spreetam@redhat.com> * Apply suggestion from @eddie-knight Co-authored-by: Eddie Knight <knight@linux.com> Signed-off-by: sonupreetam <spreetam@redhat.com> * Apply suggestion from @eddie-knight Co-authored-by: Eddie Knight <knight@linux.com> Signed-off-by: sonupreetam <spreetam@redhat.com> --------- Signed-off-by: sonupreetam <spreetam@redhat.com> Co-authored-by: Eddie Knight <knight@linux.com>
1 parent e7e69c9 commit 110bffc

1 file changed

Lines changed: 89 additions & 0 deletions

File tree

security-insights.yml

Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
---
2+
header:
3+
schema-version: 2.0.0
4+
last-updated: '2026-04-06'
5+
last-reviewed: '2026-04-06'
6+
url: https://github.com/gemaraproj/go-gemara
7+
project-si-source: https://raw.githubusercontent.com/gemaraproj/.github/refs/heads/main/.github/security-insights.yml
8+
9+
repository:
10+
url: https://github.com/gemaraproj/go-gemara
11+
status: active
12+
accepts-change-request: true
13+
accepts-automated-change-request: true
14+
core-team:
15+
- name: Eddie Knight
16+
affiliation: Sonatype
17+
email: knight@linux.com
18+
- name: Jenn Power
19+
affiliation: Red Hat
20+
email: barnabei.jennifer@gmail.com
21+
primary: true
22+
documentation:
23+
contributing-guide: https://github.com/gemaraproj/gemara/blob/main/CONTRIBUTING.md
24+
license:
25+
url: https://github.com/gemaraproj/go-gemara?tab=Apache-2.0-1-ov-file#readme
26+
expression: Apache-2.0
27+
security:
28+
assessments:
29+
self:
30+
comment: |
31+
Self assessment has not yet been completed.
32+
tools:
33+
- name: Dependabot
34+
type: SCA
35+
version: "2"
36+
rulesets:
37+
- built-in
38+
results:
39+
adhoc:
40+
name: Scheduled SCA Scan Results
41+
predicate-uri: https://docs.github.com/en/graphql/reference/objects#repositoryvulnerabilityalert
42+
location: https://github.com/gemaraproj/go-gemara/security/dependabot
43+
comment: |
44+
Dependabot runs every Monday.
45+
The configuration can be found here: https://github.com/gemaraproj/go-gemara/blob/main/.github/dependabot.yaml
46+
integration:
47+
adhoc: true
48+
ci: false
49+
release: false
50+
- name: CodeQL
51+
type: SAST
52+
version: "2.y.z"
53+
rulesets:
54+
- go
55+
- actions
56+
results:
57+
adhoc:
58+
name: Scheduled SAST Results
59+
predicate-uri: https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/schemas/sarif-schema-2.1.0.json
60+
location: https://github.com/gemaraproj/go-gemara/security/code-scanning
61+
comment: |
62+
The results of the scheduled SAST scan are available in the Code Scanning tab of the Security Insights page and as an artifact on the scheduled job.
63+
ci:
64+
name: CI SAST Results
65+
predicate-uri: https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/schemas/sarif-schema-2.1.0.json
66+
location: https://github.com/gemaraproj/go-gemara/security/code-scanning
67+
comment: |
68+
The results of the CI SAST scan are available in the Code Scanning tab of the Security Insights page.
69+
integration:
70+
adhoc: true
71+
ci: true
72+
release: false
73+
- name: Kusari Inspector
74+
type: other
75+
rulesets:
76+
- default
77+
comment: |
78+
Kusari Inspector is set up to scan on pull request submissions.
79+
It analyzes dependency changes, licenses, vulnerabilities, code security,
80+
and workflow risks, posting results as PR comments via the GitHub App.
81+
results:
82+
ci:
83+
name: CI Scan Results
84+
predicate-uri: https://docs.kusari.cloud/Inspector/integrations/github
85+
location: https://github.com/gemaraproj/go-gemara/pulls
86+
integration:
87+
adhoc: false
88+
ci: true
89+
release: false

0 commit comments

Comments
 (0)