@@ -42,7 +42,7 @@ Tool Verification Report Template
4242
4343.. note ::
4444 An example of a Tool Verification Report can be found here:
45- `Example Tool Verification Report <https://eclipse-score.github.io/score/main/score_tools/doc_as_code .html#doc_tool__doc_as_code >`_
45+ `Example Tool Verification Report <https://eclipse-score.github.io/score/main/score_tools/gtest .html#doc_tool__gtest >`_
4646
4747
4848[Your Tool Name] Verification Report
@@ -99,18 +99,18 @@ Installation
9999[Describe here how to install the tool]
100100
101101.. tip ::
102- May add where is the tool located?
102+ May add where is the tool located
103103
104- May add how the tool is configured in order to be used in safe/secure way?
104+ May add how the tool is configured in order to be used in safe/secure way
105105
106- May add access/usage protection required? , execution authority required?
106+ May add access/usage protection required, execution authority required
107107
108108Integration
109109~~~~~~~~~~~
110110[Describe here how to integrate the tool in existing toolchain]
111111
112112.. tip ::
113- May add how the tool works together with other tools?
113+ May add how the tool works together with other tools
114114
115115Environment
116116~~~~~~~~~~~
@@ -124,21 +124,20 @@ Safety evaluation
124124.. tip ::
125125 Determine the use case for the tool in the project and for each use case
126126
127- Determine the malfunctions/threats
127+ Determine the malfunctions
128128
129- Determine the tool impact based on the malfunctions/threats
129+ Determine the tool impact based on the malfunctions
130130
131- Determine the available safety/security measures
131+ Determine the available safety measures
132132
133- Determine if the impact detection based on safety/security measures are sufficient and
133+ Determine if the impact detection based on safety measures are sufficient and
134134 add additional ones, if required
135135
136136 Determine the tool confidence based on tool impact and tool impact detection
137137
138- Use the table below to document all uses cases and their evaluation. The table has an
139- example included.
138+ Use the table below to document all uses cases and their evaluation, the example table provided below
140139
141- The final Confidence shall be judged on the maximum confidence level of each use case.
140+ The final confidence shall be judged on the maximum confidence level of each use case
142141
143142
144143.. list-table :: [Your tool name] evaluation
@@ -198,13 +197,12 @@ Security evaluation
198197
199198 Determine the available security measures
200199
201- Determine if the impact detection based on s security measures are sufficient and
200+ Determine if the impact detection based on security measures are sufficient and
202201 add additional ones, if required
203202
204- Use the table below to document all uses cases and their security evaluation.
205- The table has an example included.
203+ Use the table below to document all uses cases and their security evaluation, the example table provided below
206204
207- The final Confidence shall be judged on the maximum confidence level of each use case.
205+ The final confidence shall be judged on the maximum confidence level of each use case
208206
209207.. list-table :: [Your tool name] security evaluation
210208 :header-rows: 1
@@ -248,8 +246,14 @@ Security evaluation
248246
249247Result
250248~~~~~~
251- Add here final statement, if tool qualification is required or not.
249+ .. tip ::
250+ Add here final statement, if tool qualification is required or not.
251+
252+ [Your tool name] requires qualification for use in safety-related software development according to ISO 26262.
253+
254+ or
252255
256+ [Your tool name] does not require qualification for use in safety-related software development according to ISO 26262.
253257
254258**Optional Section for Tool Qualification **
255259-------------------------------------------
@@ -261,11 +265,11 @@ Requirements and testing aspects
261265[Describe here requirements and their tests from user point of view]
262266
263267.. tip ::
264- Where are tool requirements defined?
268+ Where are tool requirements defined
265269
266- Where are the test cases for the requirements defined?
270+ Where are the test cases for the requirements defined
267271
268- Where are the requirements coverage documented?
272+ Where are the requirements coverage documented
269273
270274
271275Analysis perspective
@@ -275,8 +279,8 @@ Analysis perspective
275279.. tip ::
276280 Optional:
277281
278- Where is the architectural design of the tool defined?
282+ Where is the architectural design of the tool defined
279283
280- Where is the safety analysis for the tool defined?
284+ Where is the safety analysis for the tool defined
281285
282- Where is the security analysis for the tool defined?
286+ Where is the security analysis for the tool defined
0 commit comments