{"date":"2026-04-13","repo":{"name":"github.com/kubernetes/kube-state-metrics","commit":"33b5ed4736af0bcfb94ca8b51fc3adf8d51d20e2"},"scorecard":{"version":"v5.4.1-0.20260408191012-81b380477e3b","commit":"81b380477e3be32cec5c824783bcf222978afafa"},"score":5.9,"checks":[{"name":"Maintained","score":10,"reason":"30 commit(s) and 12 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#maintained"}},{"name":"Code-Review","score":9,"reason":"Found 13/14 approved changesets -- score normalized to 9","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#code-review"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#dangerous-workflow"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: SECURITY.md:1","Info: Found linked content: SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1","Info: Found text in security policy: SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#security-policy"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#binary-artifacts"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: jobLevel 'contents' permission set to 'write': .github/workflows/openvex.yml:17","Warn: jobLevel 'contents' permission set to 'write': .github/workflows/sbom.yaml:16","Info: jobLevel 'pull-requests' permission set to 'read': .github/workflows/semantic.yml:16","Warn: jobLevel 'statuses' permission set to 'write': .github/workflows/semantic.yml:17","Info: topLevel 'contents' permission set to 'read': .github/workflows/ci.yml:17","Info: topLevel 'contents' permission set to 'read': .github/workflows/govulncheck.yml:9","Info: topLevel 'contents' permission set to 'read': .github/workflows/openvex.yml:10","Warn: topLevel 'contents' permission set to 'write': .github/workflows/pre-release.yml:9","Info: topLevel 'contents' permission set to 'read': .github/workflows/sbom.yaml:9","Info: topLevel 'contents' permission set to 'read': .github/workflows/semantic.yml:11"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#token-permissions"}},{"name":"CII-Best-Practices","score":2,"reason":"badge detected: InProgress","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#cii-best-practices"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#fuzzing"}},{"name":"Pinned-Dependencies","score":6,"reason":"dependency not pinned by hash detected -- score normalized to 6","details":["Warn: containerImage not pinned by hash: Dockerfile:3: pin your Docker image by updating golang:1.26 to golang:1.26@sha256:5f3787b7f902c07c7ec4f3aa91a301a3eda8133aa32661a3b3a3a86ab3a68a36","Warn: containerImage not pinned by hash: Dockerfile:11","Warn: downloadThenRun not pinned by hash: .github/workflows/ci.yml:41","Warn: goCommand not pinned by hash: .github/workflows/govulncheck.yml:23","Info:  25 out of  25 GitHub-owned GitHubAction dependencies pinned","Info:   4 out of   4 third-party GitHubAction dependencies pinned","Info:   0 out of   2 containerImage dependencies pinned","Info:   0 out of   1 downloadThenRun dependencies pinned","Info:   0 out of   1 goCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#pinned-dependencies"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#packaging"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#license"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#branch-protection"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v2.18.0 not signed: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/277681893","Warn: release artifact v2.17.0 not signed: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/243886828","Warn: release artifact v2.16.0 not signed: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/227676455","Warn: release artifact v2.15.0 not signed: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/198093418","Warn: release artifact v2.14.0 not signed: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/184328573","Warn: release artifact v2.18.0 does not have provenance: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/277681893","Warn: release artifact v2.17.0 does not have provenance: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/243886828","Warn: release artifact v2.16.0 does not have provenance: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/227676455","Warn: release artifact v2.15.0 does not have provenance: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/198093418","Warn: release artifact v2.14.0 does not have provenance: https://api.github.com/repos/kubernetes/kube-state-metrics/releases/184328573"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#signed-releases"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 29 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/81b380477e3be32cec5c824783bcf222978afafa/docs/checks.md#sast"}}]}
