Skip to content

Commit 9494777

Browse files
authored
Merge branch 'main' into main
2 parents f4fb707 + 85483c2 commit 9494777

File tree

302 files changed

+19944
-17183
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

302 files changed

+19944
-17183
lines changed

.github/security-insights.yml

Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
header:
2+
schema-version: 2.0.0
3+
last-updated: '2025-11-25'
4+
last-reviewed: '2025-11-25'
5+
url: https://github.com/ossf/scorecard
6+
comment: This file contains the security information for the Scorecard project.
7+
8+
project:
9+
name: Scorecard
10+
administrators:
11+
- name: Stephen Augustus
12+
affiliation: Bloomberg
13+
primary: true
14+
- name: Raghav Kaul
15+
affiliation: Google
16+
- name: Spencer Schrock
17+
affiliation: Google
18+
# TODO(security-insights): Extend this to include all Scorecard repos in our next review pass.
19+
repositories:
20+
- name: Scorecard
21+
url: https://github.com/ossf/scorecard
22+
comment: |
23+
ossf/scorecard is the core repo for the Scorecard project.
24+
steward:
25+
uri: https://openssf.org
26+
comment: |
27+
Scorecard is maintained by volunteers under the oversight of the Open Source Security Foundation (OpenSSF).
28+
vulnerability-reporting:
29+
reports-accepted: true
30+
bug-bounty-available: false
31+
32+
repository:
33+
status: active
34+
url: https://github.com/ossf/scorecard
35+
accepts-change-request: true
36+
accepts-automated-change-request: true
37+
no-third-party-packages: false
38+
core-team:
39+
- name: Stephen Augustus
40+
affiliation: Bloomberg
41+
primary: true
42+
- name: Raghav Kaul
43+
affiliation: Google
44+
- name: Adam Korczynski
45+
affiliation: ADA Logics
46+
- name: Jeff Mendoza
47+
affiliation: Microsoft
48+
- name: Spencer Schrock
49+
affiliation: Google
50+
license:
51+
url: https://github.com/ossf/scorecard/blob/main/LICENSE
52+
expression: Apache-2.0
53+
security:
54+
assessments:
55+
audit-2025:
56+
evidence: https://openssf.org/blog/2025/10/10/openssf-scorecard-audit-is-complete/
57+
comment: |
58+
This audit was coordinated by Open Source Technology Improvement Fund (OSTIF) and undertaken by the ADA
59+
Logics team during early summer of 2025.
60+
Within the scope of review was five repositories: scorecard-webapp, scorecard-action, scorecard-monitor,
61+
scorecard, and allstar. These five projects underwent formal threat modeling, which then guided the manual
62+
code review that followed. Each repository interacts with different interfaces, handles different
63+
(potentially sensitive) data, and therefore has differing attack impacts that affect its security needs.
64+
Fuzzing work was also performed during this audit, and resulted in the uncovering of some of the reported
65+
findings.
66+
documentation:
67+
contributing-guide: https://github.com/ossf/scorecard/blob/main/CONTRIBUTING.md
68+
governance: https://github.com/ossf/scorecard/blob/main/MAINTAINERS.md
69+
security-policy: https://github.com/ossf/scorecard/blob/main/SECURITY.md
70+
release:
71+
automated-pipeline: true
72+
distribution-points:
73+
- uri: https://github.com/ossf/scorecard/releases
74+
comment: GitHub Releases page

.github/workflows/codeql-analysis.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ permissions:
3737
contents: read
3838

3939
env:
40-
GO_VERSION: 1.24
40+
GO_VERSION: stable
4141

4242
jobs:
4343
analyze:
@@ -55,25 +55,25 @@ jobs:
5555

5656
steps:
5757
- name: Harden Runner
58-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
58+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
5959
with:
6060
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
6161

6262
- name: Checkout repository
63-
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
63+
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
6464

6565
# don't use the default version of Go from GitHub runners
6666
# https://github.com/github/codeql-action/issues/1842#issuecomment-1704398087
6767
- name: Setup Go
68-
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
68+
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
6969
with:
7070
go-version: ${{ env.GO_VERSION }}
7171
check-latest: true
7272
cache: false # CodeQL needs to build everything itself to do its analysis
7373

7474
# Initializes the CodeQL tools for scanning.
7575
- name: Initialize CodeQL
76-
uses: github/codeql-action/init@60168efe1c415ce0f5521ea06d5c2062adbeed1b # v3.28.17
76+
uses: github/codeql-action/init@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
7777
with:
7878
languages: ${{ matrix.language }}
7979
queries: +security-extended
@@ -85,7 +85,7 @@ jobs:
8585
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
8686
# If this step fails, then you should remove it and run the build manually (see below)
8787
- name: Autobuild
88-
uses: github/codeql-action/autobuild@60168efe1c415ce0f5521ea06d5c2062adbeed1b # v3.28.17
88+
uses: github/codeql-action/autobuild@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
8989

9090
# ℹ️ Command-line programs to run using the OS shell.
9191
# 📚 https://git.io/JvXDl
@@ -99,4 +99,4 @@ jobs:
9999
# make release
100100

101101
- name: Perform CodeQL Analysis
102-
uses: github/codeql-action/analyze@60168efe1c415ce0f5521ea06d5c2062adbeed1b # v3.28.17
102+
uses: github/codeql-action/analyze@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9

.github/workflows/depsreview.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,6 @@ jobs:
2222
runs-on: ubuntu-latest
2323
steps:
2424
- name: 'Checkout Repository'
25-
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
25+
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
2626
- name: 'Dependency Review'
27-
uses: actions/dependency-review-action@da24556b548a50705dd671f47852072ea4c105d9 # v4.7.1
27+
uses: actions/dependency-review-action@3c4e3dcb1aa7874d2c16be7d79418e9b7efd6261 # v4.8.2

.github/workflows/docker.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ on:
2323
- main
2424

2525
env:
26-
GO_VERSION: 1.24
26+
GO_VERSION: stable
2727

2828
jobs:
2929
docs_only_check:
@@ -35,7 +35,7 @@ jobs:
3535
docs_only: ${{ steps.docs_only_check.outputs.docs_only }}
3636
steps:
3737
- name: Check out code
38-
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 #v4.2.2
38+
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 #v6.0.1
3939
with:
4040
fetch-depth: 2 # needed to diff changed files
4141
- id: docs_only_check
@@ -72,15 +72,15 @@ jobs:
7272
steps:
7373
- name: Harden Runner
7474
if: (needs.docs_only_check.outputs.docs_only != 'true')
75-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
75+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
7676
with:
7777
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
7878
- name: Clone the code
7979
if: (needs.docs_only_check.outputs.docs_only != 'true')
80-
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
80+
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
8181
- name: Setup Go # needed for some of the Makefile evaluations, even if building happens in Docker
8282
if: (needs.docs_only_check.outputs.docs_only != 'true')
83-
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
83+
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
8484
with:
8585
go-version: ${{ env.GO_VERSION }}
8686
check-latest: true

.github/workflows/gitlab.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,23 +25,23 @@ on:
2525
- main
2626

2727
env:
28-
GO_VERSION: 1.24
28+
GO_VERSION: stable
2929

3030
jobs:
3131
gitlab-integration-trusted:
3232
runs-on: ubuntu-latest
3333
environment: gitlab
3434
steps:
3535
- name: Harden Runner
36-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
36+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
3737
with:
3838
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
3939
- name: Clone the code
40-
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
40+
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
4141
with:
4242
ref: ${{ github.event.pull_request.head.sha || github.sha }} # head SHA if PR, else fallback to push SHA
4343
- name: Setup Go
44-
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
44+
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
4545
with:
4646
go-version: ${{ env.GO_VERSION }}
4747
check-latest: true
@@ -52,7 +52,7 @@ jobs:
5252
echo "go-mod=$(go env GOMODCACHE)" >> "$GITHUB_OUTPUT"
5353
- name: Cache builds
5454
# https://github.com/mvdan/github-actions-golang#how-do-i-set-up-caching-between-builds
55-
uses: actions/cache@5a3ec84eff668545956fd18022155c47e93e2684 #v4.2.3
55+
uses: actions/cache@9255dc7a253b0ccc959486e2bca901246202afeb #v5.0.1
5656
with:
5757
path: |
5858
${{ steps.go-cache-paths.outputs.go-build }}
@@ -86,7 +86,7 @@ jobs:
8686
command: make e2e-gitlab-token
8787

8888
- name: codecov
89-
uses: codecov/codecov-action@ad3126e916f78f00edff4ed0317cf185271ccc2d # 5.4.2
89+
uses: codecov/codecov-action@671740ac38dd9b0130fbe1cec585b89eea48d3de # 5.5.2
9090
with:
9191
files: "*e2e-coverage.out"
9292
verbose: true

.github/workflows/goreleaser.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ permissions:
2323
contents: read
2424

2525
env:
26-
GO_VERSION: 1.24
26+
GO_VERSION: stable
2727

2828
jobs:
2929
goreleaser:
@@ -34,16 +34,16 @@ jobs:
3434
runs-on: ubuntu-latest
3535
steps:
3636
- name: Harden Runner
37-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
37+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
3838
with:
3939
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
4040

4141
- name: Checkout
42-
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
42+
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
4343
with:
4444
fetch-depth: 0
4545
- name: Set up Go
46-
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v2.2.0
46+
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v2.2.0
4747
with:
4848
go-version: ${{ env.GO_VERSION }}
4949
check-latest: true
@@ -52,7 +52,7 @@ jobs:
5252
run: echo "version_flags=$(./scripts/version-ldflags)" >> "$GITHUB_OUTPUT"
5353
- name: Run GoReleaser
5454
id: run-goreleaser
55-
uses: goreleaser/goreleaser-action@9c156ee8a17a598857849441385a2041ef570552 # v6.3.0
55+
uses: goreleaser/goreleaser-action@e435ccd777264be153ace6237001ef4d979d3a7a # v6.4.0
5656
with:
5757
args: release --clean
5858
env:
@@ -85,7 +85,7 @@ jobs:
8585
permissions: read-all
8686
steps:
8787
- name: Install the verifier
88-
uses: slsa-framework/slsa-verifier/actions/installer@v2.7.0
88+
uses: slsa-framework/slsa-verifier/actions/installer@ea584f4502babc6f60d9bc799dbbb13c1caa9ee6 # v2.7.1
8989

9090
- name: Download assets
9191
env:

.github/workflows/integration.yml

Lines changed: 6 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@
1212
# See the License for the specific language governing permissions and
1313
# limitations under the License.
1414

15-
# Run secret-dependent integration tests only after approval
1615
name: Integration tests
1716

1817
on:
@@ -24,35 +23,23 @@ permissions:
2423
contents: read
2524

2625
env:
27-
GO_VERSION: 1.24
26+
GO_VERSION: stable
2827

2928
jobs:
30-
approve:
31-
runs-on: ubuntu-latest
32-
steps:
33-
- name: Harden Runner
34-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
35-
with:
36-
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
37-
38-
- name: approve
39-
run: echo For security reasons, all pull requests need to be approved before running integration tests.
40-
4129
integration-trusted:
4230
runs-on: ubuntu-latest
4331
environment: integration-test
44-
needs: [approve]
4532
steps:
4633
- name: Harden Runner
47-
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
34+
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
4835
with:
4936
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
5037
- name: Clone the code
51-
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
38+
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
5239
with:
5340
ref: ${{ github.event.pull_request.head.sha }}
5441
- name: Setup Go
55-
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
42+
uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
5643
with:
5744
go-version: ${{ env.GO_VERSION }}
5845
check-latest: true
@@ -63,7 +50,7 @@ jobs:
6350
echo "go-mod=$(go env GOMODCACHE)" >> "$GITHUB_OUTPUT"
6451
- name: Cache builds
6552
# https://github.com/mvdan/github-actions-golang#how-do-i-set-up-caching-between-builds
66-
uses: actions/cache@5a3ec84eff668545956fd18022155c47e93e2684 #v4.2.3
53+
uses: actions/cache@9255dc7a253b0ccc959486e2bca901246202afeb #v5.0.1
6754
with:
6855
path: |
6956
${{ steps.go-cache-paths.outputs.go-build }}
@@ -87,7 +74,7 @@ jobs:
8774
command: make e2e-gh-token
8875

8976
- name: codecov
90-
uses: codecov/codecov-action@ad3126e916f78f00edff4ed0317cf185271ccc2d # 5.4.2
77+
uses: codecov/codecov-action@671740ac38dd9b0130fbe1cec585b89eea48d3de # 5.5.2
9178
with:
9279
files: "*e2e-coverage.out"
9380
verbose: true

.github/workflows/lint.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,26 +12,26 @@ permissions:
1212
pull-requests: read # Use with `only-new-issues` option.
1313

1414
env:
15-
GO_VERSION: 1.24
15+
GO_VERSION: stable
1616

1717
jobs:
1818
golangci:
1919
name: check-linter
2020
runs-on: ubuntu-latest
2121
steps:
22-
- uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
22+
- uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
2323
with:
2424
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
25-
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26-
- uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5.5.0
25+
- uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
26+
- uses: actions/setup-go@4dc6199c7b1a012772edbd06daecab0f50c9053c # v6.1.0
2727
with:
2828
go-version: ${{ env.GO_VERSION }}
2929
cache: false # golangci-lint maintains its own cache
3030
- name: set golangci-lint version # keep in sync with tools/go.mod
3131
run: |
32-
echo "GOLANGCI_LINT_VERSION=$(cd tools; go list -m -f '{{ .Version }}' github.com/golangci/golangci-lint)" >> "$GITHUB_ENV"
32+
echo "GOLANGCI_LINT_VERSION=$(cd tools; go list -m -f '{{ .Version }}' github.com/golangci/golangci-lint/v2)" >> "$GITHUB_ENV"
3333
- name: golangci-lint
34-
uses: golangci/golangci-lint-action@55c2c1448f86e01eaae002a5a3a9624417608d84 # v6.5.2
34+
uses: golangci/golangci-lint-action@4afd733a84b1f43292c63897423277bb7f4313a9 # v8.0.0
3535
with:
3636
version: ${{ env.GOLANGCI_LINT_VERSION }}
3737
only-new-issues: true

0 commit comments

Comments
 (0)