Merged
Conversation
imran-siddique
added a commit
that referenced
this pull request
Mar 4, 2026
Comprehensive proposal documents for each standards body and framework integration submission: - LFAI-PROPOSAL.md — LF AI & Data Foundation Sandbox (PR #102) - COSAI-WS4-PROPOSAL.md — CoSAI/OASIS WS4 RFC (Issue #42) - OWASP-ASI-PROPOSAL.md — OWASP ASI code samples (PR #2) - MAF-INTEGRATION-PROPOSAL.md — Microsoft Agent Framework (Issue #4440) - GOOGLE-ADK-PROPOSAL.md — Google ADK GovernancePlugin (Issue #4543) - OPENLIT-INTEGRATION-PROPOSAL.md — OpenLit instrumentation (PR #1037) Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
…-a8af-012ebf9d2fb7
imran-siddique
added a commit
that referenced
this pull request
Apr 1, 2026
… 37 files) (#684) * fix(security): eliminate CI injection vectors and pin actions (#1) - Move all github.event.* expressions from run: to env: blocks (CWE-94) - spell-check.yml: changed_files via env var - markdown-link-check.yml: changed_files via temp file input - ai-spec-drafter.yml: issue.number via env var - ai-test-generator.yml: pull_request.number via env var - ai-release-notes.yml: release.tag_name via env var - sbom.yml: release.tag_name via env var - Redact secret scanner output to prevent secret leaks to CI logs (CWE-200) - SHA-pin dtolnay/rust-toolchain (the only unpinned action) (CWE-829) - Add missing permissions: block to markdown-link-check.yml (CWE-250) Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com> * fix(security): supply chain hardening — dep confusion, lockfiles, Dockerfile digest (#2) - Fix dependency confusion: replace agent-primitives==0.1.0 with local file references in scak and iatp requirements.txt (CWE-427) - Pin root Dockerfile base image to SHA digest (CWE-829) - Generate missing package-lock.json for 4 npm packages (CWE-829): mcp-proxy, api, chrome extension, mastra-agentmesh - Remove unsafe npm ci || npm install fallback in ESRP pipeline (CWE-829) Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com> * fix(security): Docker/infra hardening — CORS, Grafana, .dockerignore, CODEOWNERS (#3) - Replace hardcoded Grafana admin passwords with env var refs in 7 docker-compose files (CWE-798) - Replace wildcard CORS allow_origins=[*] with env-driven origins in 6 production services (CWE-942) - Add secret exclusion patterns (.env, *.key, *.pem, *.p12) to root and caas .dockerignore files (CWE-532) - Add security contact, supported versions, and 90-day disclosure policy to SECURITY.md (CWE-693) - Add CODEOWNERS rules for scripts/, Dockerfile, docker-compose*, .dockerignore, .clusterfuzzlite/ (CWE-862) Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com> * fix(security): code quality — XSS, Rust panics, example warnings (#4) - Replace innerHTML with safe DOM APIs (textContent, createElement) in PolicyEditorPanel.ts and MetricsDashboardPanel.ts (CWE-79) - Add HTML entity escaping for violation names in metrics dashboard - Replace .unwrap() with .expect() on production RwLock/Mutex calls in policy.rs for clearer panic messages (CWE-252) - Add INTENTIONALLY INSECURE warnings to test fixture code in github-reviewer example to prevent copy-paste propagation Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com> --------- Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Please accept this contribution adding the standard Microsoft SECURITY.MD 🔒 file to help the community understand the security policy and how to safely report security issues. GitHub uses the presence of this file to light-up security reminders and a link to the file. This pull request commits the latest official SECURITY.MD file from https://github.com/microsoft/repo-templates/blob/main/shared/SECURITY.md.
Microsoft teams can learn more about this effort and share feedback within the open source guidance available internally.