{"date":"2026-04-18T02:13:27Z","repo":{"name":"github.com/sigstore/cosign","commit":"b7462fb60764850a789392429d3ba40f969d07db"},"scorecard":{"version":"v5.3.0","commit":"c22063e786c11f9dd714d777a687ff7c4599b600"},"score":8.1,"checks":[{"name":"Code-Review","score":10,"reason":"all changesets reviewed","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#code-review"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#binary-artifacts"}},{"name":"Dependency-Update-Tool","score":10,"reason":"update tool detected","details":["Info: detected update tool: Dependabot: .github/dependabot.yml:1"],"documentation":{"short":"Determines if the project uses a dependency update tool.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#dependency-update-tool"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#dangerous-workflow"}},{"name":"Maintained","score":10,"reason":"30 commit(s) and 3 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#maintained"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#packaging"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Info: jobLevel 'contents' permission set to 'read': .github/workflows/build.yaml:43","Warn: jobLevel 'packages' permission set to 'write': .github/workflows/build.yaml:44","Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:44","Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:45","Info: jobLevel 'contents' permission set to 'read': .github/workflows/cut-release.yml:42","Info: jobLevel 'contents' permission set to 'read': .github/workflows/depsreview.yml:27","Info: jobLevel 'contents' permission set to 'read': .github/workflows/donotsubmit.yaml:34","Info: jobLevel 'contents' permission set to 'read': .github/workflows/e2e-with-binary.yml:45","Warn: jobLevel 'packages' permission set to 'write': .github/workflows/github-oidc.yaml:40","Info: jobLevel 'contents' permission set to 'read': .github/workflows/github-oidc.yaml:41","Info: jobLevel 'contents' permission set to 'read': .github/workflows/golangci-lint.yml:31","Info: jobLevel 'contents' permission set to 'read': .github/workflows/golangci-lint.yml:57","Info: jobLevel 'contents' permission set to 'read': .github/workflows/kind-verify-attestation.yaml:45","Info: jobLevel 'actions' permission set to 'read': .github/workflows/scorecard-action.yml:37","Info: jobLevel 'contents' permission set to 'read': .github/workflows/scorecard-action.yml:38","Info: jobLevel 'contents' permission set to 'read': .github/workflows/tests.yaml:194","Info: jobLevel 'contents' permission set to 'read': .github/workflows/tests.yaml:230","Info: jobLevel 'contents' permission set to 'read': .github/workflows/tests.yaml:35","Info: jobLevel 'contents' permission set to 'read': .github/workflows/tests.yaml:91","Info: jobLevel 'contents' permission set to 'read': .github/workflows/validate-release.yml:51","Info: jobLevel 'contents' permission set to 'read': .github/workflows/validate-release.yml:31","Info: jobLevel 'contents' permission set to 'read': .github/workflows/verify-docgen.yaml:34","Info: jobLevel 'contents' permission set to 'read': .github/workflows/whitespace.yaml:33","Info: found token with 'none' permissions: .github/workflows/build.yaml:1","Info: found token with 'none' permissions: .github/workflows/codeql-analysis.yml:1","Info: topLevel 'contents' permission set to 'read': .github/workflows/conformance-nightly.yml:23","Info: topLevel 'contents' permission set to 'read': .github/workflows/conformance.yml:26","Warn: no topLevel permission defined: .github/workflows/cut-release.yml:1","Info: found token with 'none' permissions: .github/workflows/depsreview.yml:1","Info: found token with 'none' permissions: .github/workflows/donotsubmit.yaml:1","Warn: no topLevel permission defined: .github/workflows/e2e-tests.yml:1","Info: found token with 'none' permissions: .github/workflows/e2e-with-binary.yml:1","Info: found token with 'none' permissions: .github/workflows/github-oidc.yaml:1","Info: found token with 'none' permissions: .github/workflows/golangci-lint.yml:1","Info: found token with 'none' permissions: .github/workflows/kind-verify-attestation.yaml:1","Info: found token with 'none' permissions: .github/workflows/scorecard-action.yml:1","Warn: no topLevel permission defined: .github/workflows/tests.yaml:1","Info: found token with 'none' permissions: .github/workflows/validate-release.yml:1","Info: found token with 'none' permissions: .github/workflows/verify-docgen.yaml:1","Info: found token with 'none' permissions: .github/workflows/whitespace.yaml:1"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#token-permissions"}},{"name":"CII-Best-Practices","score":2,"reason":"badge detected: InProgress","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#cii-best-practices"}},{"name":"Pinned-Dependencies","score":8,"reason":"dependency not pinned by hash detected -- score normalized to 8","details":["Warn: third-party GitHubAction not pinned by hash: .github/workflows/conformance-nightly.yml:45: update your workflow using https://app.stepsecurity.io/secureworkflow/sigstore/cosign/conformance-nightly.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/cut-release.yml:39: update your workflow using https://app.stepsecurity.io/secureworkflow/sigstore/cosign/cut-release.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/depsreview.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/sigstore/cosign/depsreview.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/e2e-tests.yml:122: update your workflow using https://app.stepsecurity.io/secureworkflow/sigstore/cosign/e2e-tests.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/e2e-tests.yml:158: update your workflow using https://app.stepsecurity.io/secureworkflow/sigstore/cosign/e2e-tests.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/kind-verify-attestation.yaml:80: update your workflow using https://app.stepsecurity.io/secureworkflow/sigstore/cosign/kind-verify-attestation.yaml/main?enable=pin","Warn: containerImage not pinned by hash: Dockerfile:18: pin your Docker image by updating golang:1.25.7 to golang:1.25.7@sha256:5a79b94c34c299ac0361fbb7c7fca6dc552e166b42341050323fa3ab137d7be9","Warn: goCommand not pinned by hash: .github/workflows/tests.yaml:247","Info:  49 out of  49 GitHub-owned GitHubAction dependencies pinned","Info:  22 out of  28 third-party GitHubAction dependencies pinned","Info:   0 out of   1 containerImage dependencies pinned","Info:   2 out of   3 goCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#pinned-dependencies"}},{"name":"Vulnerabilities","score":5,"reason":"5 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2022-0635","Warn: Project is vulnerable to: GO-2022-0646","Warn: Project is vulnerable to: GO-2026-4772 / GHSA-9jj7-4m8r-rfcm","Warn: Project is vulnerable to: GO-2026-4771","Warn: Project is vulnerable to: GHSA-xm5m-wgh2-rrg3"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#vulnerabilities"}},{"name":"Signed-Releases","score":8,"reason":"5 out of the last 5 releases have a total of 5 signed artifacts.","details":["Info: signed release artifact: cosign-3.0.6-1.aarch64.rpm.sigstore.json: https://github.com/sigstore/cosign/releases/tag/v3.0.6","Info: signed release artifact: cosign-2.6.3-1.aarch64.rpm-keyless.sig: https://github.com/sigstore/cosign/releases/tag/v2.6.3","Info: signed release artifact: cosign-3.0.5-1.aarch64.rpm.sigstore.json: https://github.com/sigstore/cosign/releases/tag/v3.0.5","Info: signed release artifact: cosign-3.0.4-1.aarch64.rpm.sigstore.json: https://github.com/sigstore/cosign/releases/tag/v3.0.4","Info: signed release artifact: cosign-2.6.2-1.aarch64.rpm-keyless.sig: https://github.com/sigstore/cosign/releases/tag/v2.6.2","Warn: release artifact v3.0.6 does not have provenance: https://api.github.com/repos/sigstore/cosign/releases/305842182","Warn: release artifact v2.6.3 does not have provenance: https://api.github.com/repos/sigstore/cosign/releases/305838705","Warn: release artifact v3.0.5 does not have provenance: https://api.github.com/repos/sigstore/cosign/releases/288413621","Warn: release artifact v3.0.4 does not have provenance: https://api.github.com/repos/sigstore/cosign/releases/275625037","Warn: release artifact v2.6.2 does not have provenance: https://api.github.com/repos/sigstore/cosign/releases/275620649"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#signed-releases"}},{"name":"SAST","score":7,"reason":"SAST tool detected but not run on all commits","details":["Info: SAST configuration detected: CodeQL","Warn: 0 commits out of 30 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#sast"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#branch-protection"}},{"name":"Fuzzing","score":10,"reason":"project is fuzzed","details":["Info: OSSFuzz integration found","Info: GoBuiltInFuzzer integration found: pkg/cosign/attestation/fuzz_test.go:23","Info: GoBuiltInFuzzer integration found: pkg/cosign/cue/fuzz_test.go:22","Info: GoBuiltInFuzzer integration found: pkg/cosign/fuzz_test.go:40","Info: GoBuiltInFuzzer integration found: pkg/cosign/fuzz_test.go:71","Info: GoBuiltInFuzzer integration found: pkg/cosign/rego/fuzz_test.go:22","Info: GoBuiltInFuzzer integration found: pkg/policy/fuzz_test.go:49"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#license"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: github.com/sigstore/.github/SECURITY.md:1","Info: Found linked content: github.com/sigstore/.github/SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: github.com/sigstore/.github/SECURITY.md:1","Info: Found text in security policy: github.com/sigstore/.github/SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#security-policy"}},{"name":"CI-Tests","score":10,"reason":"28 out of 28 merged PRs checked by a CI test -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project runs tests before pull requests are merged.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#ci-tests"}},{"name":"Contributors","score":10,"reason":"project has 71 contributing companies or organizations","details":["Info: found contributions from: GitHubBounty, KernelCafe, NixOS, PyCQA, SBOM-Community, Trendyol, always further inc, bindl-dev, bom-squad, botless, buildpacks, caarlos0-graveyard, carabiner-dev, carabiner-dev  @uservers, catppuccin, cdfoundation, chainguard, chainguard-dev, chainguard-images, charm-and-friends, cloudevents, cloudnativetr, distroless, dracula, driftlessaf, falcosecurity, fluxcd, fosdem-testingautomation, funtenna, gatekeeper, getantibody, github, gittuf, google, googlers, goreleaser, helm, honk-ci, in-toto, ir8labs, jaegertracing, keylime, knative, ko-build, kubernetes, kubernetes-nightly, kubernetes-sigs, linkedin, microsoft, multi-factor-auth-users, npm, octo-sts, opencontainers, opensbom-generator, openshift, openvex, ossf, pdxcat, prometheus-community, protobom, red hat, redhat-et, sigstore, slsa-framework, stacklok, tektoncd, trendyol, unicode-snowman, uservers, wolfi-dev, yahoo"],"documentation":{"short":"Determines if the project has a set of contributors from multiple organizations (e.g., companies).","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#contributors"}}]}
