-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bring CLOMonitor Score to 100% #9769
Comments
The |
This was completed in #9837
And there's a new one now:
Assigning to myself right now as I may be working on the related SLSA Level 3, Level 4 checks soon. But anyone can feel free to add as well! |
Welp, never mind, apparently Snyk does not support this for Go deps (see also the CLOMonitor issue: cncf/clomonitor#50 (comment)). So I integrated FOSSA same as Argo CD (see also #12023 that was made automatically). So am gonna make a PR for that badge for CLOMonitor and that should bring our non-security scores at 100%. EDIT: See #12032 I'm going to open a separate issue for the security scores / OpenSSF checks so that we can close this one out and that one can be more focused. There's also a few other newer OpenSSF checks as well, and |
@eddie-knight curious if the I also haven't seen any project (including k8s itself) adopt a |
Definitely @agilgur5. The SI was adopted by CLOMonitor (not via Scorecard) at the beginning of this month in order to streamline the hygiene checks you listed there. If there's a clarity gap I'd love to get more insight from you so that I can make sure to improve the related supporting material for the Slam. |
Is it going to be added to Scorecard? It's a bit confusing that most, but not all, of the security checks are via Scorecard
Not really a clarity gap, I understand what More specifically, the lack of adoption for it currently (including in Scorecard) combined with how much information there is to fill out for it (plus yet another file at the root of the repo) makes the effort/value ratio feel not really worthwhile right now. |
I can't speak on the Scorecard roadmap (but there are folks in the CNCF Slack #security-slam channel who can). I believe there is discussion of extending Scorecard to reference the SI in situations where less-predictable things such as SBOM artifacts are needing to be detected. That's the idea behind integrating it into CLOMonitor— we tried to capture the results of those discussions in a CLOMonitor GitHub issue for posterity. You can see there was debate around whether the new checks should be in the |
Yea I guess I am confused as to the difference between CLOMonitor's security checks and Scorecard's checks; one would think they'd be the same. I see that Security Policy and SBOMs are also CLOMonitor-only.
Well ok this got completed in CD argoproj/argo-cd#16135 so the effort is now significantly reduced as Workflows would be very similar |
CLOMonitor currently runs a subset of scorecard checks and run a few additional checks that have been recommended by either TAG Security or maintainers of graduated CNCF projects. To compare and contrast a bit... In scorecard, nobody is reasonably expected to have a full 10/10 score, so checks can't be optionally skipped. In contrast, projects can skip CLOMonitor checks (including the checks that harness Scorecard) by providing a written justification in the CLOMonitor config. |
Per discussion in slack, this issue is to track the efforts necessary to bring argo-workflow CLOMonitor score to 100% as part of the CNCF security slam.
Below is a checklist of action items. I will add comments if there is anything that can't be addressed or if I am unsure of how to address it. It is possible to exclude checks with a written justification if that becomes necssary.
CLOMonitor report
Summary
Repository: argo-workflows
URL: https://github.com/argoproj/argo-workflows
Checks sets:
CODE
Score: 88
Checks passed per category
Checks
Documentation [100%]
License [75%]
Best Practices [100%]
EXEMPT
Security [80%]
For more information about the checks sets available and how each of the checks work, please see the CLOMonitor's documentation.
The text was updated successfully, but these errors were encountered: