openRiskScore
scorecard
openRiskScore | scorecard | |
---|---|---|
1 | 25 | |
29 | 4,156 | |
- | 2.8% | |
4.0 | 9.7 | |
7 months ago | about 16 hours ago | |
Python | Go | |
- | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
openRiskScore
scorecard
-
Can some expert analyze a github repo and tell us if it's really safe or not?
For general open source hygiene, I'd recommend running OpenSSF scorecards on your github repo and following-up on anything it suggests. https://github.com/ossf/scorecard.
-
Securizing your GitHub org
The OSSF scorecard initiative is really good to assess your project against security best practices. I am not the first to write about this.
- OpenSSF Scorecard – Build better security habits, one test at a time
-
You should use the OpenSSF Scorecard
Each area has its own associated risk, so the overall score is the average of the five areas. Here, you can check the details of each by consulting the documentation in detail.
-
Software Supply Chain and Data Infrastructure Security - 5 lessons from AllDayDevOps 2022
Mitigation, according to Sean, is a combination of appropriate (network) access control, SCA (Software Composition Analysis) tooling to manage your policies around CVEs, and purging “all the things”. He also thinks MFA (multi-factor authentication) for authors of (critical) packages should be required. Sean gets his vulnerability insights from deps.dev, ossindex.sonatype, and cvedetails.com, and closely monitors interesting initiatives such as the OpenSSF Security Scorecards - a tool to assess open source projects for security risks through a series of automated checks.
- Boost Your Enterprise Security with GitHub Actions and the OSSF Score Card
- How does your company manage open-source dependencies?
-
Washington, DC, and open—for maintainers
Give feedback on new security standards: The various security standards like OpenSSF Scorecard and SLSA.dev can be a lot to digest, but they are likely going to be very influential in developing government standards. Take a peek at them, and if you have concerns or questions, file issues. The people behind them want to hear from a broad range of maintainers, so your feedback really does matter. (If you're a Tidelift maintainer partner, you can also bring the feedback to us—we are participating in these discussions, and may be able to either point to existing discussions, explain them more deeply, or bring your feedback to the appropriate places.)
-
Episode 102: myNewsWrap – SAP and Microsoft
Security Scorecards
-
Best practices for managing Java dependencies
I recommend using https://deps.dev to get a feeling for what you are bringing into your project. It also integrates with OSSF Scorecards, which gives a good overview over how healthy the project is, and whether it employs industry best practices.
What are some alternatives?
flower - Flower: A Friendly Federated Learning Framework
in-toto - in-toto is a framework to protect supply chain integrity.
FATE - An Industrial Grade Federated Learning Framework
snyk - Snyk CLI scans and monitors your projects for security vulnerabilities. [Moved to: https://github.com/snyk/cli]
Lynx - A very light weight dependency graph for systems with massive calculation complexities or scheduling systems
cli - Snyk CLI scans and monitors your projects for security vulnerabilities.
tern - Tern is a software composition analysis tool and Python library that generates a Software Bill of Materials for container images and Dockerfiles. The SBOM that Tern generates will give you a layer-by-layer view of what's inside your container in a variety of formats including human-readable, JSON, HTML, SPDX and more.
harden-runner - Network egress filtering and runtime security for GitHub-hosted and self-hosted runners
ElectricEye - ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
slsa - Supply-chain Levels for Software Artifacts
Open-Risk-Manual-PdfBooks - Collection of PdfBooks extracted from the Open Risk Manual
kaniko - Build Container Images In Kubernetes