Skip to content

feat(security): enforce supply chain security for repository#31

Open
emmanuelknafo wants to merge 1 commit intomainfrom
feature/30-enforce-supply-chain-security
Open

feat(security): enforce supply chain security for repository#31
emmanuelknafo wants to merge 1 commit intomainfrom
feature/30-enforce-supply-chain-security

Conversation

@emmanuelknafo
Copy link
Contributor

  • Remove exposed Azure Storage key from appsettings.json files
  • Update vulnerable NuGet packages (Microsoft.Data.SqlClient 5.2.0, System.Text.Json 8.0.5, Newtonsoft.Json 13.0.3)
  • Enhance CODEOWNERS with security-sensitive path protection
  • Update SECURITY.md with project-specific vulnerability reporting
  • Add SBOM attestation to build workflow (SLSA Level 2+)
  • Add container signing preparation to CI workflow
  • Create comprehensive security documentation

Fixes #30

- Remove exposed Azure Storage key from appsettings.json files
- Update vulnerable NuGet packages (Microsoft.Data.SqlClient 5.2.0, System.Text.Json 8.0.5, Newtonsoft.Json 13.0.3)
- Enhance CODEOWNERS with security-sensitive path protection
- Update SECURITY.md with project-specific vulnerability reporting
- Add SBOM attestation to build workflow (SLSA Level 2+)
- Add container signing preparation to CI workflow
- Create comprehensive security documentation

Fixes #30
@emmanuelknafo emmanuelknafo requested a review from CalinL as a code owner February 5, 2026 01:14
@github-actions
Copy link

github-actions bot commented Feb 5, 2026

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

Snapshot Warnings

⚠️: No snapshots were found for the head SHA ccef2f6.
Ensure that dependencies are being submitted on PR branches and consider enabling retry-on-snapshot-warnings. See the documentation for more information and troubleshooting advice.

OpenSSF Scorecard

PackageVersionScoreDetails
actions/actions/attest-build-provenance 1.*.* UnknownUnknown
actions/actions/attest-sbom 1.*.* UnknownUnknown
nuget/Microsoft.Data.SqlClient 5.2.0 🟢 7
Details
CheckScoreReason
Code-Review🟢 9Found 28/30 approved changesets -- score normalized to 9
Maintained🟢 1030 commit(s) and 8 issue activity found in the last 90 days -- score normalized to 10
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Security-Policy🟢 10security policy file detected
Token-Permissions🟢 9detected GitHub workflow tokens with excessive permissions
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
License🟢 10license file detected
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
Binary-Artifacts🟢 10no binaries found in the repo
Branch-Protection🟢 4branch protection is not maximal on development and all release branches
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing⚠️ 0project is not fuzzed
SAST🟢 9SAST tool detected but not run on all commits
Vulnerabilities🟢 100 existing vulnerabilities detected
nuget/Newtonsoft.Json 13.0.3 🟢 5.5
Details
CheckScoreReason
Maintained🟢 43 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 4
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Packaging⚠️ -1packaging workflow not detected
Token-Permissions🟢 9detected GitHub workflow tokens with excessive permissions
Code-Review🟢 4Found 13/30 approved changesets -- score normalized to 4
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Security-Policy⚠️ 0security policy file not detected
Binary-Artifacts🟢 10no binaries found in the repo
License🟢 10license file detected
Vulnerabilities🟢 100 existing vulnerabilities detected
Pinned-Dependencies⚠️ 0dependency not pinned by hash detected -- score normalized to 0
Fuzzing⚠️ 0project is not fuzzed
Signed-Releases⚠️ 0Project has not signed or included provenance with any releases.
Branch-Protection⚠️ -1internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md
SAST🟢 8SAST tool detected but not run on all commits
nuget/System.Text.Json 8.0.5 🟢 6.1
Details
CheckScoreReason
Code-Review🟢 10all changesets reviewed
Maintained🟢 1030 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Packaging⚠️ -1packaging workflow not detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
License🟢 10license file detected
Security-Policy🟢 10security policy file detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Signed-Releases⚠️ -1no releases found
Branch-Protection🟢 5branch protection is not maximal on development and all release branches
Binary-Artifacts⚠️ 0binaries present in source code
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
Pinned-Dependencies⚠️ 2dependency not pinned by hash detected -- score normalized to 2
Fuzzing🟢 10project is fuzzed
Vulnerabilities🟢 91 existing vulnerabilities detected

Scanned Files

  • .github/workflows/SCA-Microsoft-SBOM.yml
  • src/webapp01/webapp01.csproj

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Enforce supply chain security for repository

1 participant