{"date":"2024-01-15","repo":{"name":"github.com/intel/afxdp-plugins-for-kubernetes","commit":"145696b3e7da58d95f45c65429df4aedebc4b885"},"scorecard":{"version":"v4.8.0","commit":"c40859202d739b31fd060ac5b30d17326cd74275"},"score":8.8,"checks":[{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#binary-artifacts"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#branch-protection"}},{"name":"CI-Tests","score":10,"reason":"30 out of 30 merged PRs checked by a CI test -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project runs tests before pull requests are merged.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#ci-tests"}},{"name":"CII-Best-Practices","score":0,"reason":"no badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#cii-best-practices"}},{"name":"Code-Review","score":10,"reason":"30 out of last 30 changesets reviewed before merge -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project requires code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#code-review"}},{"name":"Contributors","score":6,"reason":"2 different organizations found -- score normalized to 6","details":["Info: contributors work for intel,red hat"],"documentation":{"short":"Determines if the project has a set of contributors from multiple organizations (e.g., companies).","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#contributors"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#dangerous-workflow"}},{"name":"Dependency-Update-Tool","score":10,"reason":"update tool detected","details":["Info: Dependabot detected"],"documentation":{"short":"Determines if the project uses a dependency update tool.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#dependency-update-tool"}},{"name":"Fuzzing","score":10,"reason":"project is fuzzed with [GoBuiltInFuzzer]","details":["Info: func FuzzReadConfigFile(f *testing.F): internal/deviceplugin/config_test.go:1158"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: : LICENSE:1"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#license"}},{"name":"Maintained","score":7,"reason":"9 commit(s) out of 30 and 0 issue activity out of 12 found in the last 90 days -- score normalized to 7","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#maintained"}},{"name":"Packaging","score":-1,"reason":"no published package detected","details":["Warn: no GitHub publishing workflow detected"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#packaging"}},{"name":"Pinned-Dependencies","score":5,"reason":"dependency not pinned by hash detected -- score normalized to 5","details":["Warn: third-party GitHubAction not pinned by hash: .github/workflows/public-ci.yml:132: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/public-ci.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/public-ci.yml:148: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/public-ci.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/public-ci.yml:158: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/public-ci.yml/main?enable=pin","Warn: containerImage not pinned by hash: test/e2e/Dockerfile:14: pin your Docker image by updating alpine to alpine@sha256:51b67269f354137895d43f3b3d810bfacd3945438e94dc5ac55fdac340352f48","Warn: goCommand not pinned by hash: .github/workflows/public-ci.yml:87","Info: no insecure (not pinned by hash) dependency downloads found in Dockerfiles","Info: no insecure (not pinned by hash) dependency downloads found in shell scripts"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#pinned-dependencies"}},{"name":"SAST","score":7,"reason":"SAST tool detected but not run on all commmits","details":["Warn: 0 commits out of 30 are checked with a SAST tool","Info: SAST tool detected: CodeQL"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#sast"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy detected in current repo: SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#security-policy"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":["Warn: no GitHub releases found"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#signed-releases"}},{"name":"Token-Permissions","score":9,"reason":"non read-only tokens detected in GitHub workflows","details":["Info: topLevel 'contents' permission set to 'read': .github/workflows/codeql.yml:10: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/codeql.yml/main?enable=permissions","Info: topLevel 'contents' permission set to 'read': .github/workflows/internal-ci.yml:5: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/internal-ci.yml/main?enable=permissions","Info: topLevel 'contents' permission set to 'read': .github/workflows/public-ci.yml:6: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/public-ci.yml/main?enable=permissions","Info: jobLevel 'contents' permission set to 'read': .github/workflows/public-ci.yml:124: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/public-ci.yml/main?enable=permissions","Info: jobLevel 'contents' permission set to 'read': .github/workflows/public-ci.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/public-ci.yml/main?enable=permissions","Warn: jobLevel 'statuses' permission set to 'write': .github/workflows/public-ci.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/public-ci.yml/main?enable=permissions","Info: topLevel permissions set to 'read-all': .github/workflows/scorecard.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/intel/afxdp-plugins-for-kubernetes/scorecard.yml/main?enable=permissions"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#token-permissions"}},{"name":"Vulnerabilities","score":10,"reason":"no vulnerabilities detected","details":null,"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/c40859202d739b31fd060ac5b30d17326cd74275/docs/checks.md#vulnerabilities"}}]}
