You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
📖 Tweak Best Practices badge description to clarify things (ossf#2907)
* Tweak Best Practices badge description to clarify things
Signed-off-by: David A. Wheeler <[email protected]>
* Provided clearer message when there's no BP badge detected
Signed-off-by: David A. Wheeler <[email protected]>
* Remove extra line that shouldn't be there
Signed-off-by: David A. Wheeler <[email protected]>
---------
Signed-off-by: David A. Wheeler <[email protected]>
Signed-off-by: Avishay <[email protected]>
[Binary-Artifacts](docs/checks.md#binary-artifacts) | Is the project free of checked-in binaries? | High | PAT, GITHUB_TOKEN | Fully Supported |
439
439
[Branch-Protection](docs/checks.md#branch-protection) | Does the project use [Branch Protection](https://docs.github.com/en/free-pro-team@latest/github/administering-a-repository/about-protected-branches) ? | High | PAT (`repo` or `repo> public_repo`), GITHUB_TOKEN | Fully Supported | certain settings are only supported with a maintainer PAT
440
440
[CI-Tests](docs/checks.md#ci-tests) | Does the project run tests in CI, e.g. [GitHub Actions](https://docs.github.com/en/free-pro-team@latest/actions), [Prow](https://github.com/kubernetes/test-infra/tree/master/prow)? | Low | PAT, GITHUB_TOKEN | Unsupported
441
-
[CII-Best-Practices](docs/checks.md#cii-best-practices) | Does the project have an [OpenSSF (formerly CII) Best Practices Badge](https://bestpractices.coreinfrastructure.org/en)? | Low | PAT, GITHUB_TOKEN | Fully Supported |
441
+
[CII-Best-Practices](docs/checks.md#cii-best-practices) | Has the project earned an [OpenSSF (formerly CII) Best Practices Badge](https://bestpractices.coreinfrastructure.org) at the passing, silver, or gold level? | Low | PAT, GITHUB_TOKEN | Fully Supported |
442
442
[Code-Review](docs/checks.md#code-review) | Does the project practice code review before code is merged? | High | PAT, GITHUB_TOKEN | Fully Supported |
443
443
[Contributors](docs/checks.md#contributors) | Does the project have contributors from at least two different organizations? | Low | PAT, GITHUB_TOKEN | Fully Supported |
444
444
[Dangerous-Workflow](docs/checks.md#dangerous-workflow) | Does the project avoid dangerous coding patterns in GitHub Action workflows? | Critical | PAT, GITHUB_TOKEN | Unsupported |
Copy file name to clipboardExpand all lines: docs/checks.md
+9-26
Original file line number
Diff line number
Diff line change
@@ -158,38 +158,21 @@ If a project's system was not detected and you think it should be, please
158
158
159
159
Risk: `Low` (possibly not following security best practices)
160
160
161
-
This check determines whether the project has earned an [OpenSSF (formerly CII) Best Practices Badge](https://bestpractices.coreinfrastructure.org/),
162
-
which indicates that the project uses a set of security-focused best development practices for open
161
+
This check determines whether the project has earned an [OpenSSF (formerly CII) Best Practices Badge](https://bestpractices.coreinfrastructure.org/) at the passing, silver, or gold level.
162
+
The OpenSSF Best Practices badge indicates whether or not that the project uses a set of security-focused best development practices for open
163
163
source software. The check uses the URL for the Git repo and the OpenSSF Best Practices badge API.
164
164
165
165
The OpenSSF Best Practices badge has 3 tiers: passing, silver, and gold. We give
166
-
full credit to projects that meet the [gold criteria](https://bestpractices.coreinfrastructure.org/criteria/2), which is a
167
-
significant achievement for many projects. Lower scores represent a project that
168
-
is at least working to achieve a badge, with increasingly more points awarded as
full credit to projects that meet the [gold criteria](https://bestpractices.coreinfrastructure.org/criteria/2), which is a significant achievement for projects and requires multiple developers in the project.
167
+
Lower scores represent a project that has met the silver criteria, met the passing criteria, or is working to achieve the passing badge, with increasingly more points awarded as more criteria are met. Note that even meeting the passing criteria is a significant achievement.
175
168
176
-
To earn the passing badge, the project MUST:
177
-
178
-
- publish the process for reporting vulnerabilities on the project site
179
-
- provide a working build system that can automatically rebuild the software
180
-
from source code (where applicable)
181
-
- have a general policy that tests will be added to an automated test suite
182
-
when major new functionality is added
183
-
- meet various cryptography criteria where applicable
184
-
- have at least one primary developer who knows how to design secure software
185
-
- have at least one primary developer who knows of common kinds of errors
186
-
that lead to vulnerabilities in this kind of software (and at least one
187
-
method to counter or mitigate each of them)
188
-
- apply at least one static code analysis tool (beyond compiler warnings and
189
-
"safe" language modes) to any proposed major production release.
Some of these criteria overlap with other Scorecard checks.
192
-
175
+
However, note that in those overlapping cases, Scorecard can only report what it can automatically detect, while the OpenSSF Best Practices badge can report on claims and claim justifications from people (this counters false negatives and positives but has the challenge of requiring additional work from people).
193
176
194
177
**Remediation steps**
195
178
- Sign up for the [OpenSSF Best Practices program](https://bestpractices.coreinfrastructure.org/).
Copy file name to clipboardExpand all lines: docs/checks/internal/checks.yaml
+9-25
Original file line number
Diff line number
Diff line change
@@ -255,37 +255,21 @@ checks:
255
255
description: |
256
256
Risk: `Low` (possibly not following security best practices)
257
257
258
-
This check determines whether the project has earned an [OpenSSF (formerly CII) Best Practices Badge](https://bestpractices.coreinfrastructure.org/),
259
-
which indicates that the project uses a set of security-focused best development practices for open
258
+
This check determines whether the project has earned an [OpenSSF (formerly CII) Best Practices Badge](https://bestpractices.coreinfrastructure.org/) at the passing, silver, or gold level.
259
+
The OpenSSF Best Practices badge indicates whether or not that the project uses a set of security-focused best development practices for open
260
260
source software. The check uses the URL for the Git repo and the OpenSSF Best Practices badge API.
261
261
262
262
The OpenSSF Best Practices badge has 3 tiers: passing, silver, and gold. We give
263
-
full credit to projects that meet the [gold criteria](https://bestpractices.coreinfrastructure.org/criteria/2), which is a
264
-
significant achievement for many projects. Lower scores represent a project that
265
-
is at least working to achieve a badge, with increasingly more points awarded as
full credit to projects that meet the [gold criteria](https://bestpractices.coreinfrastructure.org/criteria/2), which is a significant achievement for projects and requires multiple developers in the project.
264
+
Lower scores represent a project that has met the silver criteria, met the passing criteria, or is working to achieve the passing badge, with increasingly more points awarded as more criteria are met. Note that even meeting the passing criteria is a significant achievement.
272
265
273
-
To earn the passing badge, the project MUST:
274
-
275
-
- publish the process for reporting vulnerabilities on the project site
276
-
- provide a working build system that can automatically rebuild the software
277
-
from source code (where applicable)
278
-
- have a general policy that tests will be added to an automated test suite
279
-
when major new functionality is added
280
-
- meet various cryptography criteria where applicable
281
-
- have at least one primary developer who knows how to design secure software
282
-
- have at least one primary developer who knows of common kinds of errors
283
-
that lead to vulnerabilities in this kind of software (and at least one
284
-
method to counter or mitigate each of them)
285
-
- apply at least one static code analysis tool (beyond compiler warnings and
286
-
"safe" language modes) to any proposed major production release.
Some of these criteria overlap with other Scorecard checks.
272
+
However, note that in those overlapping cases, Scorecard can only report what it can automatically detect, while the OpenSSF Best Practices badge can report on claims and claim justifications from people (this counters false negatives and positives but has the challenge of requiring additional work from people).
289
273
remediation:
290
274
- >-
291
275
Sign up for the [OpenSSF Best Practices program](https://bestpractices.coreinfrastructure.org/).
0 commit comments