|
29 | 29 | "2024/7": 4,
|
30 | 30 | "2024/6": 15
|
31 | 31 | },
|
32 |
| - "new_commit_contributors_by_day_over_last_month": [], |
| 32 | + "new_commit_contributors_by_day_over_last_month": [ |
| 33 | + [ |
| 34 | + "2024-12-12T00:00:00.000Z", |
| 35 | + 1 |
| 36 | + ] |
| 37 | + ], |
33 | 38 | "new_commit_contributors_by_day_over_last_six_months": [
|
34 | 39 | [
|
35 | 40 | "2024-07-22T00:00:00.000Z",
|
|
51 | 56 | "nadia_badge_name": "midsize",
|
52 | 57 | "created_at": "2021-08-11T18:29:28Z",
|
53 | 58 | "ossf_scorecard": {
|
54 |
| - "date": "2024-12-22T09:30:27Z", |
| 59 | + "date": "2025-01-05T09:31:46Z", |
55 | 60 | "repo": {
|
56 | 61 | "name": "github.com/CMSgov/AB2D-Libs",
|
57 | 62 | "commit": "a44b6ee6314fb54db767a0f6c88c4ede2c87dae5"
|
58 | 63 | },
|
59 | 64 | "scorecard": {
|
60 |
| - "version": "v5.0.0-120-g5e90f2dd", |
61 |
| - "commit": "5e90f2dd5f343abfbf4583135d729b8d4167c162" |
| 65 | + "version": "v5.0.0-125-g975ee230", |
| 66 | + "commit": "975ee2304ef7097c94a377fe95976604b4adcf22" |
62 | 67 | },
|
63 | 68 | "score": 5.9,
|
64 | 69 | "checks": [
|
|
68 | 73 | "reason": "no binaries found in the repo",
|
69 | 74 | "name": "Binary-Artifacts",
|
70 | 75 | "documentation": {
|
71 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#binary-artifacts", |
| 76 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#binary-artifacts", |
72 | 77 | "short": "Determines if the project has generated executable (binary) artifacts in the source repository."
|
73 | 78 | }
|
74 | 79 | },
|
|
78 | 83 | "reason": "branch protection is not maximal on development and all release branches",
|
79 | 84 | "name": "Branch-Protection",
|
80 | 85 | "documentation": {
|
81 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#branch-protection", |
| 86 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#branch-protection", |
82 | 87 | "short": "Determines if the default and release branches are protected with GitHub's branch protection settings."
|
83 | 88 | }
|
84 | 89 | },
|
|
88 | 93 | "reason": "30 out of 30 merged PRs checked by a CI test -- score normalized to 10",
|
89 | 94 | "name": "CI-Tests",
|
90 | 95 | "documentation": {
|
91 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#ci-tests", |
| 96 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#ci-tests", |
92 | 97 | "short": "Determines if the project runs tests before pull requests are merged."
|
93 | 98 | }
|
94 | 99 | },
|
|
98 | 103 | "reason": "no effort to earn an OpenSSF best practices badge detected",
|
99 | 104 | "name": "CII-Best-Practices",
|
100 | 105 | "documentation": {
|
101 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#cii-best-practices", |
| 106 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#cii-best-practices", |
102 | 107 | "short": "Determines if the project has an OpenSSF (formerly CII) Best Practices Badge."
|
103 | 108 | }
|
104 | 109 | },
|
|
108 | 113 | "reason": "all changesets reviewed",
|
109 | 114 | "name": "Code-Review",
|
110 | 115 | "documentation": {
|
111 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#code-review", |
| 116 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#code-review", |
112 | 117 | "short": "Determines if the project requires human code review before pull requests (aka merge requests) are merged."
|
113 | 118 | }
|
114 | 119 | },
|
|
118 | 123 | "reason": "project has 5 contributing companies or organizations",
|
119 | 124 | "name": "Contributors",
|
120 | 125 | "documentation": {
|
121 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#contributors", |
| 126 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#contributors", |
122 | 127 | "short": "Determines if the project has a set of contributors from multiple organizations (e.g., companies)."
|
123 | 128 | }
|
124 | 129 | },
|
|
128 | 133 | "reason": "no dangerous workflow patterns detected",
|
129 | 134 | "name": "Dangerous-Workflow",
|
130 | 135 | "documentation": {
|
131 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#dangerous-workflow", |
| 136 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#dangerous-workflow", |
132 | 137 | "short": "Determines if the project's GitHub Action workflows avoid dangerous patterns."
|
133 | 138 | }
|
134 | 139 | },
|
|
138 | 143 | "reason": "update tool detected",
|
139 | 144 | "name": "Dependency-Update-Tool",
|
140 | 145 | "documentation": {
|
141 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#dependency-update-tool", |
| 146 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#dependency-update-tool", |
142 | 147 | "short": "Determines if the project uses a dependency update tool."
|
143 | 148 | }
|
144 | 149 | },
|
|
148 | 153 | "reason": "project is not fuzzed",
|
149 | 154 | "name": "Fuzzing",
|
150 | 155 | "documentation": {
|
151 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#fuzzing", |
| 156 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#fuzzing", |
152 | 157 | "short": "Determines if the project uses fuzzing."
|
153 | 158 | }
|
154 | 159 | },
|
|
158 | 163 | "reason": "license file detected",
|
159 | 164 | "name": "License",
|
160 | 165 | "documentation": {
|
161 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#license", |
| 166 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#license", |
162 | 167 | "short": "Determines if the project has defined a license."
|
163 | 168 | }
|
164 | 169 | },
|
|
168 | 173 | "reason": "4 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 3",
|
169 | 174 | "name": "Maintained",
|
170 | 175 | "documentation": {
|
171 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#maintained", |
| 176 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#maintained", |
172 | 177 | "short": "Determines if the project is \"actively maintained\"."
|
173 | 178 | }
|
174 | 179 | },
|
|
178 | 183 | "reason": "packaging workflow not detected",
|
179 | 184 | "name": "Packaging",
|
180 | 185 | "documentation": {
|
181 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#packaging", |
| 186 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#packaging", |
182 | 187 | "short": "Determines if the project is published as a package that others can easily download, install, easily update, and uninstall."
|
183 | 188 | }
|
184 | 189 | },
|
|
188 | 193 | "reason": "dependency not pinned by hash detected -- score normalized to 0",
|
189 | 194 | "name": "Pinned-Dependencies",
|
190 | 195 | "documentation": {
|
191 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#pinned-dependencies", |
| 196 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#pinned-dependencies", |
192 | 197 | "short": "Determines if the project has declared and pinned the dependencies of its build process."
|
193 | 198 | }
|
194 | 199 | },
|
|
198 | 203 | "reason": "SAST tool is not run on all commits -- score normalized to 0",
|
199 | 204 | "name": "SAST",
|
200 | 205 | "documentation": {
|
201 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#sast", |
| 206 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#sast", |
202 | 207 | "short": "Determines if the project uses static code analysis."
|
203 | 208 | }
|
204 | 209 | },
|
|
208 | 213 | "reason": "security policy file not detected",
|
209 | 214 | "name": "Security-Policy",
|
210 | 215 | "documentation": {
|
211 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#security-policy", |
| 216 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#security-policy", |
212 | 217 | "short": "Determines if the project has published a security policy."
|
213 | 218 | }
|
214 | 219 | },
|
|
218 | 223 | "reason": "no releases found",
|
219 | 224 | "name": "Signed-Releases",
|
220 | 225 | "documentation": {
|
221 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#signed-releases", |
| 226 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#signed-releases", |
222 | 227 | "short": "Determines if the project cryptographically signs release artifacts."
|
223 | 228 | }
|
224 | 229 | },
|
|
228 | 233 | "reason": "detected GitHub workflow tokens with excessive permissions",
|
229 | 234 | "name": "Token-Permissions",
|
230 | 235 | "documentation": {
|
231 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#token-permissions", |
| 236 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#token-permissions", |
232 | 237 | "short": "Determines if the project's workflows follow the principle of least privilege."
|
233 | 238 | }
|
234 | 239 | },
|
|
238 | 243 | "reason": "0 existing vulnerabilities detected",
|
239 | 244 | "name": "Vulnerabilities",
|
240 | 245 | "documentation": {
|
241 |
| - "url": "https://github.com/ossf/scorecard/blob/5e90f2dd5f343abfbf4583135d729b8d4167c162/docs/checks.md#vulnerabilities", |
| 246 | + "url": "https://github.com/ossf/scorecard/blob/975ee2304ef7097c94a377fe95976604b4adcf22/docs/checks.md#vulnerabilities", |
242 | 247 | "short": "Determines if the project has open, known unfixed vulnerabilities."
|
243 | 248 | }
|
244 | 249 | }
|
|
0 commit comments