{"date":"2026-04-21T08:04:13Z","repo":{"name":"github.com/Azure/secrets-store-csi-driver-provider-azure","commit":"87c87fac111aa66b8d121a0086a6d88ba6fb4cdb"},"scorecard":{"version":"v5.1.1","commit":"cd152cb6742c5b8f2f3d2b5193b41d9c50905198"},"score":6,"checks":[{"name":"Maintained","score":5,"reason":"5 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 5","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#maintained"}},{"name":"Code-Review","score":10,"reason":"all changesets reviewed","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#code-review"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: SECURITY.md:1","Info: Found linked content: SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1","Info: Found text in security policy: SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#security-policy"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#dangerous-workflow"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#binary-artifacts"}},{"name":"Dependency-Update-Tool","score":10,"reason":"update tool detected","details":["Info: detected update tool: Dependabot: .github/dependabot.yml:1"],"documentation":{"short":"Determines if the project uses a dependency update tool.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#dependency-update-tool"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Info: jobLevel 'actions' permission set to 'read': .github/workflows/scorecards.yml:31","Info: jobLevel 'contents' permission set to 'read': .github/workflows/scorecards.yml:30","Warn: topLevel 'contents' permission set to 'write': .github/workflows/chart.yaml:12","Info: topLevel 'contents' permission set to 'read': .github/workflows/codeql.yaml:14","Info: topLevel 'contents' permission set to 'read': .github/workflows/cover.yaml:11","Warn: topLevel 'contents' permission set to 'write': .github/workflows/create-release.yaml:8","Info: topLevel 'contents' permission set to 'read': .github/workflows/dependency-review.yml:13","Info: topLevel 'contents' permission set to 'read': .github/workflows/scan-vulns.yaml:16","Info: found token with 'none' permissions: .github/workflows/scorecards.yml:1","Warn: topLevel 'contents' permission set to 'write': .github/workflows/website.yaml:12","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#token-permissions"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#packaging"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#cii-best-practices"}},{"name":"Pinned-Dependencies","score":4,"reason":"dependency not pinned by hash detected -- score normalized to 4","details":["Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating mcr.microsoft.com/cbl-mariner/distroless/minimal:2.0 to mcr.microsoft.com/cbl-mariner/distroless/minimal:2.0@sha256:4fb6c12ad8ef326f648872121030fa132b820b4a85345754f17fefcdf5a4b5ff","Warn: containerImage not pinned by hash: arc/conformance/plugin/Dockerfile:3","Warn: containerImage not pinned by hash: windows.Dockerfile:2","Warn: containerImage not pinned by hash: windows.Dockerfile:4","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: goCommand not pinned by hash: .devcontainer/Dockerfile:27-70","Warn: pipCommand not pinned by hash: arc/conformance/plugin/Dockerfile:11","Warn: downloadThenRun not pinned by hash: arc/conformance/plugin/Dockerfile:14","Info:  17 out of  17 GitHub-owned GitHubAction dependencies pinned","Info:  18 out of  18 third-party GitHubAction dependencies pinned","Info:   2 out of   6 containerImage dependencies pinned","Info:   0 out of  22 goCommand dependencies pinned","Info:   0 out of   1 pipCommand dependencies pinned","Info:   0 out of   1 downloadThenRun dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#pinned-dependencies"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#fuzzing"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v1.7.2 not signed: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/256772594","Warn: release artifact v1.7.1 not signed: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/236667604","Warn: release artifact v1.7.0 not signed: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/213695366","Warn: release artifact v1.6.2 not signed: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/193960681","Warn: release artifact v1.6.1 not signed: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/191264360","Warn: release artifact v1.7.2 does not have provenance: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/256772594","Warn: release artifact v1.7.1 does not have provenance: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/236667604","Warn: release artifact v1.7.0 does not have provenance: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/213695366","Warn: release artifact v1.6.2 does not have provenance: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/193960681","Warn: release artifact v1.6.1 does not have provenance: https://api.github.com/repos/Azure/secrets-store-csi-driver-provider-azure/releases/191264360"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#signed-releases"}},{"name":"Vulnerabilities","score":0,"reason":"12 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GHSA-pc3f-x583-g7j2","Warn: Project is vulnerable to: GO-2025-3521","Warn: Project is vulnerable to: GO-2025-3547","Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg","Warn: Project is vulnerable to: GHSA-mh29-5h37-fv8m","Warn: Project is vulnerable to: GHSA-f23m-r3pf-42rh","Warn: Project is vulnerable to: GHSA-r5fr-rjxr-66jc","Warn: Project is vulnerable to: GHSA-xxjr-mmjv-4gpg","Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv","Warn: Project is vulnerable to: GHSA-3v7f-55p6-f55p","Warn: Project is vulnerable to: GHSA-c2c7-rcm5-vvqj","Warn: Project is vulnerable to: GHSA-7fh5-64p2-3v2j"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#vulnerabilities"}},{"name":"SAST","score":10,"reason":"SAST tool is run on all commits","details":["Info: SAST configuration detected: CodeQL","Info: all commits (30) are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#sast"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: MIT License: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#license"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during GetBranch(release-1.5): error during branchesHandler.query: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#branch-protection"}},{"name":"CI-Tests","score":10,"reason":"30 out of 30 merged PRs checked by a CI test -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project runs tests before pull requests are merged.","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#ci-tests"}},{"name":"Contributors","score":10,"reason":"project has 17 contributing companies or organizations","details":["Info: found contributions from: Azure, CatalystCode, MicrosoftCopilot, MicrosoftDocs, coreweave, deis, deislabs, eraser-dev, github, kaito-project, kubernetes, kubernetes-sigs, microsoft, open-policy-agent, project-copacetic, project-dalec, virtual-kubelet"],"documentation":{"short":"Determines if the project has a set of contributors from multiple organizations (e.g., companies).","url":"https://github.com/ossf/scorecard/blob/cd152cb6742c5b8f2f3d2b5193b41d9c50905198/docs/checks.md#contributors"}}]}
