Skip to content

Commit 5691556

Browse files
authored
docs: captured some basic gemara threats for this repo (#173)
Signed-off-by: Eddie Knight <knight@linux.com>
1 parent 3d537d3 commit 5691556

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed

.github/threat-assessment.yaml

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: Privateer SDK Self-Assessment
3+
metadata:
4+
id: PrivProj.SDK
5+
description: Threat catalog for Privateer SDK Self-Assessment
6+
version: 2026.Feb.28
7+
author:
8+
id: pvtr-maintainers
9+
name: Privateer Maintainer Group
10+
type: Human
11+
mapping-references:
12+
- id: CCC
13+
title: Common Cloud Controls Core
14+
version: v2025.10
15+
url: https://github.com/finos/common-cloud-controls/releases/download/v2025.10/CCC.Core_v2025.10.yaml
16+
description: |
17+
Foundational repository of reusable security controls, capabilities,
18+
and threat models maintained by FINOS.
19+
20+
capabilities:
21+
- id: PrivProj.SDK.CP01
22+
title: Go Package
23+
description: Privateer SDK is a go package, version controlled and released via GitHub and distributed by pkg.go.dev
24+
- id: PrivProj.SDK.CP02
25+
title: Plugin Development Kit
26+
description: Provides the foundational logic required for building the base of any Privateer plugin
27+
- id: PrivProj.SDK.CP03
28+
title: Shared Plugin Interfaces
29+
description: Standardizes data structures across diverse plugin implementations
30+
- id: PrivProj.SDK.CP04
31+
title: Configuration Management
32+
description: Manages plugin settings, environment variables, and configuration logic for Privateer (core) and plugins
33+
- id: PrivProj.SDK.CP05
34+
title: Evaluation Framework
35+
description: Orchestrates assessment logic to ensure consistent machine-readable validation
36+
37+
threats:
38+
- id: PrivProj.SDK.TH01
39+
title: Source Repository is Compromised
40+
description: |
41+
Access control failures on the source repository may result in distribution of compromised code,
42+
which will then compromise all downstream users.
43+
capabilities:
44+
- reference-id: PrivProj.SDK
45+
entries:
46+
- reference-id: PrivProj.SDK.CP01
47+
- reference-id: PrivProj.SDK.CP02
48+
- id: PrivProj.SDK.TH02
49+
title: Undetected Breaking Changes Disrupt Downstream Plugins
50+
description: |
51+
Syntactic or behavioral modifications to core interfaces or evaluation logic may disrupt
52+
compatibility for existing plugins, leading to silent validation failures or logic errors
53+
in security assessments.
54+
capabilities:
55+
- reference-id: PrivProj.SDK
56+
entries:
57+
- reference-id: PrivProj.SDK.CP02
58+
- reference-id: PrivProj.SDK.CP03
59+
- reference-id: PrivProj.SDK.CP05
60+
- id: PrivProj.SDK.TH03
61+
title: Supply Chain Contamination via Dependencies
62+
description: |
63+
The use of unvetted, unpinned, or compromised third-party Go modules can
64+
introduce vulnerabilities or malicious logic into the SDK and derived plugins.
65+
capabilities:
66+
- reference-id: PrivProj.SDK
67+
entries:
68+
- reference-id: PrivProj.SDK.CP01

0 commit comments

Comments
 (0)