CLOMonitoring for CNCF Security Slam #1497
-
Hey folks! Raising this discussion for feedback prior to creating any review slog for the maintainers. I'm working on the CNCF security slam. The experience doesn't explicitly include this project, but since I'm a fan of the project, I'd like to create some pull requests to improve the project's security posture following the CNCF guidelines. This will help me personally to get some practice on implementing this type of change in a familiar codebase, so if it isn't a burden I would like to start making PRs tomorrow (Thurs 9/29). According to CLOMonitor, there are 23 changes that will be required. Below the hr in this thread, I will link to the results I found and then supply two different optional processes that can be followed to replicate the scan. The feedback I'm looking for is this...
Thanks so much! To read more about the CNCF security slamhttps://events.linuxfoundation.org/kubecon-cloudnativecon-north-america/attend/experiences/ To see the CLOMonitor results that I am currently viewing:Edit: this is run against my fork, so not all 23 results are accurate for the main repository. To replicate the CLOMonitor scan yourself:Option 1- Local Installation of the CLO Web Server Option 2- Github Pull Request Integration of CLO using Lift
customTools=["/extra-tools/clomonitor.sh"]
tools=[]
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Hi @eddie-knight - personally I really welcome such contribution. Send what you have and we can setup additional processes based on the recommendations. |
Beta Was this translation helpful? Give feedback.
Hi @eddie-knight - personally I really welcome such contribution. Send what you have and we can setup additional processes based on the recommendations.