Security¶
This document outlines security practices in the template.
Note
See installation/hardening for additional security measures.
Checks¶
Key security checks include:
-
Commit validation: Enforced signature and DCO sign-off (
siderolabs/conform
⧉) -
Branch protection: No direct commits to
main
(pre-commit/pre-commit-hooks
⧉) -
Vulnerability scanning:
google/osv-scanner
⧉ -
Secret scanning:
trufflesecurity/trufflehog
⧉ -
Language-specific security checks:
zizmor
⧉ for GitHub Actions securitysemgrep/semgrep
⧉ for Python/general
-
Pinned dependencies: OSSF Scorecard ⧉
Important
These checks run both locally (pre-commit
) and in CI/CD.
Tip
Configuration is primarily in pyproject.toml
and .pre-commit-config.yaml
, with a few additional settings in .github/workflows
.
GitHub Actions¶
Important
See GitHub Actions section for details.
Security measures:
- Automated dependency updates:
renovatebot/renovate
⧉ - Minimal permissions for GitHub Actions
- Software Bill of Materials (SBOMs): Generated, stored, and attested in releases
- Reusable workflows for key tasks (e.g.,
release
,test
) to minimize misconfiguration risks (more info ⧉) - Egress monitoring:
stepsecurity/harden-runner
⧉ - Static analysis:
actionlint
⧉
Important
Security checks (e.g., scorecard
) run weekly.
Security documents¶
Tip
Review these documents and adapt them to your project.
Following Open Source Security Foundation best practices ⧉:
- Security policy:
SECURITY.md
⧉ - Machine-readable security insights:
SECURITY-INSIGHTS.yml
⧉ - Third-party dependency policy:
SECURITY-DEPENDENCY.md
- Self-assessment report:
SECURITY-SELF-ASSESSMENT.md
per CNCF guidelines ⧉ - Changelog:
CHANGELOG.md
linking to GitHub releases (FAQ)
Important
See the full OpenSSF Scorecard checklist ⧉.
Adjustments¶
Most security configurations (e.g., check-security
, check-workflow
) are in pyproject.toml
. Additional security workflows are in .github/workflows
(prefix: security-
).
OSV Scanner¶
To ignore specific vulnerabilities, modify osv-scanner.toml
(docs ⧉).
Warning
License-related issues in currently defined development dependencies are ignored by default.
Tip
osv-scanner.toml
settings are respected by OSSF Scorecard.
Conform¶
siderolabs/conform
⧉ enforces DCO sign-off and GPG signatures. Modify .conform.yml
to adjust checks.