Skip to content

Latest commit

 

History

History
77 lines (45 loc) · 5.35 KB

faq.md

File metadata and controls

77 lines (45 loc) · 5.35 KB

Frequently Asked Questions

This page answers frequently asked questions about Scorecards, including its purpose, usage, and checks. This page is continually updated. If you would like to add a question, please contribute!

Installation / Usage

Check-Specific Questions


Installation / Usage

Can I preview my project's score?

Yes.

Over a million projects are automatically tracked by the Scorecards project. These projects' scores can be seen at https://api.securityscorecards.dev/projects/github.com/<username_or_org>/<repository_name>.

You can also use the CLI to generate scores for any public repository by following these steps:

  1. Installation
  2. Authentication
  3. Basic Usage

What is the difference between Scorecards and other Code Scanning tools?

Most code scanning tools are focused on detecting specific vulnerabilities already existing in your codebase. Scorecards, however, is focused on improving the project's overall security posture by helping it adopt best practices. The best solution for your project may well be to adopt Scorecards along with other tools!

Check-specific Questions

Binary-Artifacts: Can I allowlist testing artifacts?

Scorecards lowers projects' scores whenever it detects binary artifacts. However, many projects use binary artifacts strictly for testing purposes.

While it isn't currently possible to allowlist such binaries, the Scorecards team is working on this feature (#1270).

Code-Review: Can it ignore bot commits?

This is quite a complex question. Right now, there is no way to do that. Here are some pros and cons on allowing users to set up an ignore-list for bots.

  • Pros: Some bots run very frequently; for some projects, reviewing every change is therefore not feasible or reasonable.
  • Cons: Bots can be compromised (their credentials can be compromised, for example). Or if commits are not signed, an attacker could easily send a commit spoofing the bot. This means that a bot having unsupervised write access to the repository could be a security risk.

However, this is being discussed by the Scorecards Team (#2302).

Fuzzing: Does Scorecards accept custom fuzzers?

Currently only for projects written in Go.

For more information, see the Fuzzing check description.

Pinned-Dependencies: Will Scorecards detect unpinned dependencies in tests with Dockerfiles?

Scorecards can show the dependencies that are referred to in tests like Dockerfiles, so it could be a great way for you to fix those dependencies and avoid the vulnerabilities related to version pinning dependencies. To see more about the benefits of hash pinning instead of version pinning, please see the Pinned-Dependencies check description

Pinned-Dependencies: Can I use version pinning instead of hash pinning?

Version pinning is a significant improvement over not pinning your dependencies. However, it still leaves your project vulnerable to tag-renaming attacks (where a dependency's tags are deleted and recreated to point to a malicious commit).

The OpenSSF therefore recommends hash pinning instead of version pinning, along with the use of dependency update tools such as dependabot to keep your dependencies up-to-date.

Please see the Pinned-Dependencies check description for a better understanding of the benefits of the Hash Pinning.

Signed-Releases: Why sign releases?

Currently, the main benefit of signed releases is the guarantee that a specific artifact was released by a source that you approve or attest is reliable.

However, there are already moves to make it even more relevant. For example, the OpenSSF is working on implementing signature verification for NPM packages which would allow a consumer to automatically verify if the package they are downloading was generated through a reliable builder and if it is correctly signed.

Signing releases already has some relevance and it will soon offer even more security benefits for both consumers and maintainers.