Skip to content

Commit fe2e9d2

Browse files
committed
[CP-Sec] Enable OpenSSF scorecard, dependabot and add security policy
1 parent 62562f0 commit fe2e9d2

File tree

4 files changed

+77
-0
lines changed

4 files changed

+77
-0
lines changed

.github/dependabot.yml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
2+
version: 2
3+
updates:
4+
# Enable version updates for Github Actions
5+
- package-ecosystem: "github-actions"
6+
directory: "/"
7+
schedule:
8+
interval: "monthly"
9+
groups:
10+
github-actions:
11+
patterns:
12+
- "*"
13+
reviewers:
14+
- "codeplaysoftware/security-managers"

.github/workflows/scorecard.yml

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
# Scorecards' GitHub action
2+
3+
name: Scorecard supply-chain security
4+
on:
5+
# For Branch-Protection check. Only the default branch is supported. See
6+
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
7+
branch_protection_rule:
8+
schedule:
9+
- cron: '25 15 * * 3'
10+
push:
11+
branches: [ "master" ]
12+
13+
# Declare default permissions as read only.
14+
permissions: read-all
15+
16+
jobs:
17+
analysis:
18+
name: Scorecard analysis
19+
runs-on: ubuntu-latest
20+
permissions:
21+
# Needed to upload the results to code-scanning dashboard.
22+
security-events: write
23+
# Needed to publish results and get a badge (see publish_results below).
24+
id-token: write
25+
26+
steps:
27+
- name: "Checkout code"
28+
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
29+
with:
30+
persist-credentials: false
31+
32+
- name: "Run analysis"
33+
uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
34+
with:
35+
results_file: results.sarif
36+
results_format: sarif
37+
publish_results: true
38+
39+
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
40+
# format to the repository Actions tab.
41+
- name: "Upload artifact"
42+
uses: actions/upload-artifact@50769540e7f4bd5e21e526ee35c689e35e0d6874 # v4.4.0
43+
with:
44+
name: SARIF file
45+
path: results.sarif
46+
retention-days: 5
47+
48+
# Upload the results to GitHub's code scanning dashboard (optional).
49+
# Commenting out will disable upload of results to your repo's Code Scanning dashboard
50+
- name: "Upload to code-scanning"
51+
uses: github/codeql-action/upload-sarif@294a9d92911152fe08befb9ec03e240add280cb3 # v3.26.8
52+
with:
53+
sarif_file: results.sarif

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
# TensorOpt
22

3+
[![OpenSSF Scorecard](https://api.scorecard.dev/projects/github.com/codeplaysoftware/TensorOpt/badge)](https://scorecard.dev/viewer/?uri=github.com/codeplaysoftware/TensorOpt)
4+
35
TensorOpt is designed as a wrapper around ML graph libraries.
46
Its purpose is to be integrated in ML frameworks using SYCL such as TensorFlow.
57

SECURITY.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
# Security Policy
2+
3+
## Reporting a Vulnerability
4+
5+
To report a vulnerability or a security issue please fill the security
6+
advisories form [here](../../security/advisories/new), send an email to
7+
[email protected] or contact us using the [contact form on our web
8+
page](https://codeplay.com/company/contact/?q=Report%20Security%20Issue).

0 commit comments

Comments
 (0)