Security¶
This document outlines security practices in the template.
Note
See installation/hardening for additional security measures.
Checks¶
Key security checks include:
-
Commit validation: Enforced signature and DCO sign-off (
siderolabs/conform⧉) -
Branch protection: No direct commits to
main(pre-commit/pre-commit-hooks⧉) -
Vulnerability scanning:
google/osv-scanner⧉ -
Secret scanning:
trufflesecurity/trufflehog⧉ -
Language-specific security checks:
zizmor⧉ for GitHub Actions securitysemgrep/semgrep⧉ for Python/general
-
Pinned dependencies: OSSF Scorecard ⧉
Important
These checks run both locally (pre-commit) and in CI/CD.
Tip
Configuration is primarily in pyproject.toml and .pre-commit-config.yaml, with a few additional settings in .github/workflows.
GitHub Actions¶
Important
See GitHub Actions section for details.
Security measures:
- Automated dependency updates:
renovatebot/renovate⧉ - Minimal permissions for GitHub Actions
- Software Bill of Materials (SBOMs): Generated, stored, and attested in releases
- Reusable workflows for key tasks (e.g.,
release,test) to minimize misconfiguration risks (more info ⧉) - Egress monitoring:
stepsecurity/harden-runner⧉ - Static analysis:
actionlint⧉
Important
Security checks (e.g., scorecard) run weekly.
Security documents¶
Tip
Review these documents and adapt them to your project.
Following Open Source Security Foundation best practices ⧉:
- Security policy:
SECURITY.md⧉ - Machine-readable security insights:
SECURITY-INSIGHTS.yml⧉ - Third-party dependency policy:
SECURITY-DEPENDENCY.md - Self-assessment report:
SECURITY-SELF-ASSESSMENT.mdper CNCF guidelines ⧉ - Changelog:
CHANGELOG.mdlinking to GitHub releases (FAQ)
Important
See the full OpenSSF Scorecard checklist ⧉.
Adjustments¶
Most security configurations (e.g., check-security, check-workflow) are in pyproject.toml. Additional security workflows are in .github/workflows (prefix: security-).
OSV Scanner¶
To ignore specific vulnerabilities, modify osv-scanner.toml (docs ⧉).
Warning
License-related issues in currently defined development dependencies are ignored by default.
Tip
osv-scanner.toml settings are respected by OSSF Scorecard.
Conform¶
siderolabs/conform ⧉ enforces DCO sign-off and GPG signatures. Modify .conform.yml to adjust checks.