Skip to content

Add the OpenSSF Scorecard GitHub Action #48566

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
pnacht opened this issue Sep 15, 2022 · 2 comments · Fixed by #48570
Closed

Add the OpenSSF Scorecard GitHub Action #48566

pnacht opened this issue Sep 15, 2022 · 2 comments · Fixed by #48570
Labels
CI Continuous Integration

Comments

@pnacht
Copy link
Contributor

pnacht commented Sep 15, 2022

Hello, I'm working on behalf of Google and the OpenSSF to improve the supply-chain security of essential open-source projects. The OpenSSF is a non-profit foundation dedicated to improving the security of the open-source community. It counts GitHub as a founding member.

The Scorecard system combines dozens of automated checks to let maintainers better understand their project's supply-chain security posture. It is developed by the OpenSSF, with direct support from GitHub.

Given pandas' ubiquity within the Python data-science ecosystem, the OpenSSF has included it in its list of the 100 most critical open-source projects. I see Scorecards was already referenced in PR #47652, which improved one aspect of pandas' supply-chain security.

However, the OpenSSF has also developed the Scorecard GitHub Action, which adds the results of its checks to the project's security dashboard, as well as suggestions on how to solve any issues (see examples below). Optionally, it can also publish your results to the OpenSSF REST API, which allows a badge with the project's score to be added to its README.

This Action has been adopted by 1600+ projects already. But adding pandas would single-handedly be a step change to the entire Python data-analysis ecosystem's supply-chain security.

Would you be interested in a PR which adds this Action?

Code scanning dashboard with multiple alerts, including Code-Review and Token-Permissions

Detail of a Token-Permissions alert, indicating the specific file and remediation steps

@mroeschke
Copy link
Member

Sure a PR would be welcome.

@mroeschke mroeschke added the CI Continuous Integration label Sep 15, 2022
@MarcoGorelli
Copy link
Member

@pnacht this is currently failing on the builds on main, any idea why?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
CI Continuous Integration
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants