Skip to main content

Security Audit

Comprehensive security assessment including dependencies, repository configuration, and OpenSSF Scorecard alignment

Sponsor and Ecosystem Impact

Strong security practices protect the integrity and reliability of the software supply chain your products and services depend on.

Security Audit and Update

A playbook for maintainers and pracitioners, in addition to their own resources.

Important Note: due to the obvious risk associated with this topic, at this moment we are looking to engage security foundations around this type of service. We haven’t had time for this, but appreciate outreach from those involved in this space to propose a path forward to help maintainers in a way that ensures the security of the fullfillment.

Process Milestones

  • Kick off meeting: Maintainer meets with OSS Wishlist admin and pracitioner (whether sponsor employee or verified pracitioner) to align on goals and timeline.
  • …TBD, pending discusssion with security experts
  • Wrap up meeting: Maintainer meets with OSS Wishlist maintainer and pracitioner
  • Survey (maintainer and pracitioner)

Resources

Open Source Security – Peer Review Rubric

(Aligned with OpenSSF Scorecard + Repository Security Best Practices)

Purpose: Evaluate the security posture and resilience of an open source project’s repository, workflows, dependencies, and contributor access.

Scoring Scale per Criterion:
0 = Missing / No evidence
1 = Weak / Ad-hoc
2 = Adequate but partial coverage
3 = Strong security posture, minor gaps
4 = Excellent, proactive, and automated controls


A. Access & Identity Security (0–12 pts)

CriterionIndicators of ExcellenceScore
A1. Maintainer Account SecurityAll organization/repo owners enforce 2FA; periodic access reviews.0–4
A2. Least-Privilege RolesMaintainer/admin roles minimized; automation uses granular tokens.0–4
A3. Protected Branches & Review RulesRequired code reviews, status checks, signing/verification enforced.0–4

B. Dependency & Supply-Chain Protection (0–16 pts)

CriterionIndicators of ExcellenceScore
B1. Automated Dependency ScanningDependabot or equivalent; alerts triaged promptly.0–4
B2. Vulnerability RemediationClear SLA for fixing security CVEs; tracked in issue/PR workflow.0–4
B3. Trusted Sources & PinningVersion pinning, checksum verification, no unexpected external pulls.0–4
B4. Integrity & SigningUse of Sigstore/GPG for releases and/or provenance artifacts (SLSA).0–4

C. Code Quality & Security Testing (0–12 pts)

CriterionIndicators of ExcellenceScore
C1. Static/Dynamic AnalysisCode scanning (CodeQL etc.) enabled and findings resolved.0–4
C2. CI Build Isolation & HardeningBuilds run in protected environments; secrets masked and minimal.0–4
C3. Test Coverage for Critical ComponentsAutomated tests include security-relevant logic; coverage monitored.0–4

D. Secure Practices for Contributors (0–12 pts)

CriterionIndicators of ExcellenceScore
D1. Security Policy (SECURITY.md)Clear disclosure process; expected mitigations; protected contacts.0–4
D2. Issue Reporting & Triage WorkflowResponsible disclosure honored; security issues tagged and tracked.0–4
D3. Contributor Safety in CI/CDNo secret leakage; PR security validation before merge.0–4

E. Risk Management & Governance Integration (0–8 pts)

CriterionIndicators of ExcellenceScore
E1. Third-Party Access RiskToken rotation; dependency audits; trusted artifact registries.0–4
E2. Operational Security MaturityAdoption of frameworks: OpenSSF Scorecard, SLSA, OSSF Best Practices.0–4

✅ Total Score: / 60 pts

RatingDescriptor
55–60Excellent – Secure automation and continuous security investment
46–54Strong – Minor improvements needed
34–45Adequate – Some material risks remain
20–33Weak – Significant gaps in repository security
0–19Not Viable – High security risk exposure

Reviewer Notes

  • Security weaknesses found:
  • High-risk dependencies:
  • Secrets exposure history:
  • Recommended improvements: