From 369b5e0801b2caa673637ad6110b8ac2c597b92d Mon Sep 17 00:00:00 2001
From: Ezequiel Martin Rodriguez
<123201718+ezequiel-rodriguez@users.noreply.github.com>
Date: Tue, 22 Oct 2024 20:17:25 -0300
Subject: [PATCH 1/3] Add scorecard badge
---
README.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/README.md b/README.md
index e3b15ef..e78d3aa 100644
--- a/README.md
+++ b/README.md
@@ -1,3 +1,4 @@
+[![OpenSSF Scorecard](https://api.scorecard.dev/projects/github.com/rsksmart/rsk-runes/badge)](https://scorecard.dev/viewer/?uri=github.com/rsksmart/rsk-runes)
# Runes Mock Bridge
From a705a642f3c82ee82f843fce205437ef4779a45c Mon Sep 17 00:00:00 2001
From: Ezequiel Martin Rodriguez
Date: Tue, 22 Oct 2024 23:22:19 -0300
Subject: [PATCH 2/3] Add dependabot configuration
Add scorecard workflow
Add codeql workflow
Add dependency-check workflow
---
.github/dependabot.yml | 13 +++++++
.github/workflows/codeql.yml | 42 ++++++++++++++++++++++
.github/workflows/dependency-review.yml | 20 +++++++++++
.github/workflows/scorecard.yml | 47 +++++++++++++++++++++++++
README.md | 1 +
5 files changed, 123 insertions(+)
create mode 100644 .github/dependabot.yml
create mode 100644 .github/workflows/codeql.yml
create mode 100644 .github/workflows/dependency-review.yml
create mode 100644 .github/workflows/scorecard.yml
diff --git a/.github/dependabot.yml b/.github/dependabot.yml
new file mode 100644
index 0000000..9b28445
--- /dev/null
+++ b/.github/dependabot.yml
@@ -0,0 +1,13 @@
+version: 2
+updates:
+ # Maintain dependencies for GitHub Actions
+ - package-ecosystem: github-actions
+ directory: /
+ schedule:
+ interval: daily
+
+ # Maintain dependencies for Docker
+ - package-ecosystem: docker
+ directory: /
+ schedule:
+ interval: daily
\ No newline at end of file
diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml
new file mode 100644
index 0000000..7022edf
--- /dev/null
+++ b/.github/workflows/codeql.yml
@@ -0,0 +1,42 @@
+name: "CodeQL"
+
+on:
+ push:
+ branches: [ "main" ]
+ pull_request:
+ branches: [ "main" ]
+ schedule:
+ - cron: "0 0 * * *"
+
+# Declare default permissions as read only.
+permissions: read-all
+
+jobs:
+ analyze:
+ name: Analyze
+ runs-on: ubuntu-latest
+ permissions:
+ security-events: write
+
+ strategy:
+ fail-fast: false
+ matrix:
+ language: [javascript]
+
+ steps:
+ - name: Checkout
+ uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
+
+ - name: Initialize CodeQL
+ uses: github/codeql-action/init@f779452ac5af1c261dce0346a8f964149f49322b #v3.26.13
+ with:
+ languages: ${{ matrix.language }}
+ queries: +security-and-quality
+
+ - name: Autobuild
+ uses: github/codeql-action/autobuild@f779452ac5af1c261dce0346a8f964149f49322b #v3.26.13
+
+ - name: Perform CodeQL Analysis
+ uses: github/codeql-action/analyze@f779452ac5af1c261dce0346a8f964149f49322b #v3.26.13
+ with:
+ category: "/language:${{ matrix.language }}"
\ No newline at end of file
diff --git a/.github/workflows/dependency-review.yml b/.github/workflows/dependency-review.yml
new file mode 100644
index 0000000..d3507de
--- /dev/null
+++ b/.github/workflows/dependency-review.yml
@@ -0,0 +1,20 @@
+name: 'Dependency Review'
+on: [pull_request]
+
+# Declare default permissions as read only.
+permissions: read-all
+
+jobs:
+ dependency-review:
+ runs-on: ubuntu-latest
+ permissions:
+ pull-requests: write
+ steps:
+ - name: 'Checkout Repository'
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 # v4.2.1
+
+ - name: 'Dependency Review'
+ uses: actions/dependency-review-action@5a2ce3f5b92ee19cbb1541a4984c76d921601d7c # v4.3.4
+ with:
+ fail-on-severity: high
+ comment-summary-in-pr: true
\ No newline at end of file
diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml
new file mode 100644
index 0000000..0a71e85
--- /dev/null
+++ b/.github/workflows/scorecard.yml
@@ -0,0 +1,47 @@
+name: Scorecard supply-chain security
+on:
+ branch_protection_rule:
+ schedule:
+ - cron: '33 2 * * 2'
+ push:
+ branches: [ "main" ]
+
+# Declare default permissions as read only.
+permissions: read-all
+
+jobs:
+ analysis:
+ name: Scorecard analysis
+ runs-on: ubuntu-latest
+ permissions:
+ security-events: write
+ id-token: write
+
+ steps:
+ - name: "Checkout code"
+ uses: actions/checkout@eef61447b9ff4aafe5dcd4e0bbf5d482be7e7871 #v4.2.1
+ with:
+ persist-credentials: false
+
+ - name: "Run analysis"
+ uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
+ with:
+ results_file: results.sarif
+ results_format: sarif
+ publish_results: true
+
+ # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
+ # format to the repository Actions tab.
+ - name: "Upload artifact"
+ uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 #v4.4.3
+ with:
+ name: SARIF file
+ path: results.sarif
+ retention-days: 5
+
+ # Upload the results to GitHub's code scanning dashboard (optional).
+ # Commenting out will disable upload of results to your repo's Code Scanning dashboard
+ - name: "Upload to code-scanning"
+ uses: github/codeql-action/upload-sarif@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
+ with:
+ sarif_file: results.sarif
\ No newline at end of file
diff --git a/README.md b/README.md
index e78d3aa..4e8e871 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,5 @@
[![OpenSSF Scorecard](https://api.scorecard.dev/projects/github.com/rsksmart/rsk-runes/badge)](https://scorecard.dev/viewer/?uri=github.com/rsksmart/rsk-runes)
+[![CodeQL](https://github.com/rsksmart/rskj/workflows/CodeQL/badge.svg)](https://github.com/rsksmart/rsk-runes/actions?query=workflow%3ACodeQL)
# Runes Mock Bridge
From fb25937f963eb03ce5c1d36ac3e6b3be2f0d16aa Mon Sep 17 00:00:00 2001
From: Ezequiel Martin Rodriguez
Date: Wed, 23 Oct 2024 19:23:40 -0300
Subject: [PATCH 3/3] Create SECURITY.MD
---
SECURITY.MD | 27 +++++++++++++++++++++++++++
1 file changed, 27 insertions(+)
create mode 100644 SECURITY.MD
diff --git a/SECURITY.MD b/SECURITY.MD
new file mode 100644
index 0000000..d401ae5
--- /dev/null
+++ b/SECURITY.MD
@@ -0,0 +1,27 @@
+# Reporting Security Issues
+
+The Rootstock team and community take security bugs in rootstock seriously. Beside this project is out of our Bug Bounty Program scope, we appreciate your efforts to responsibly disclose your findings, and will make every effort to acknowledge your contributions.
+
+
+## Responsible Disclosure
+
+For all security related issues, rsk-runes has two main points of contact. Reach us at or use the GitHub Security Advisory ["Report a Vulnerability"](https://github.com/rsksmart/rsk-runes/security/advisories/new) tab.
+
+The Rootstock team will send a response indicating the next steps in handling your report. After the initial reply to your report, the security team will keep you informed of the progress towards a fix and full announcement, and may ask for additional information or guidance.
+
+**Ensure the bug was not already reported** by searching on GitHub under [Issues](https://github.com/rsksmart/rsk-runes/issues).
+
+## Vulnerability Handling
+
+### Response Time
+
+RootstockLabs will make a best effort to meet the following response times for reported vulnerabilities:
+
+* Time to first response (from report submit) - 5 business days
+* Time to triage (from report submit) - 7 business days
+
+We’ll try to keep you informed about our progress throughout the process.
+
+### Disclose Policy
+
+Follow our [disclosure guidelines](https://www.rootstocklabs.com/bounty-program/).
\ No newline at end of file