{"date":"2025-10-18T01:59:18Z","repo":{"name":"github.com/sigstore/timestamp-authority","commit":"5e5bfedb1837800f00be71417153f4cd13687255"},"scorecard":{"version":"v5.3.0","commit":"c22063e786c11f9dd714d777a687ff7c4599b600"},"score":9.5,"checks":[{"name":"Maintained","score":10,"reason":"30 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#maintained"}},{"name":"Dependency-Update-Tool","score":10,"reason":"update tool detected","details":["Info: detected update tool: Dependabot: .github/dependabot.yml:1"],"documentation":{"short":"Determines if the project uses a dependency update tool.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#dependency-update-tool"}},{"name":"Token-Permissions","score":10,"reason":"GitHub workflow tokens follow principle of least privilege","details":["Info: jobLevel 'contents' permission set to 'read': .github/workflows/build-snapshot.yaml:11","Info: jobLevel 'actions' permission set to 'read': .github/workflows/release.yaml:73","Info: jobLevel 'contents' permission set to 'read': .github/workflows/scorecard.yaml:36","Info: jobLevel 'actions' permission set to 'read': .github/workflows/scorecard.yaml:35","Info: jobLevel 'contents' permission set to 'read': .github/workflows/tests.yaml:94","Info: jobLevel 'contents' permission set to 'read': .github/workflows/tests.yaml:114","Info: jobLevel 'contents' permission set to 'read': .github/workflows/tests.yaml:30","Info: jobLevel 'contents' permission set to 'read': .github/workflows/tests.yaml:74","Info: found token with 'none' permissions: .github/workflows/build-snapshot.yaml:1","Info: topLevel 'contents' permission set to 'read': .github/workflows/codeql_analysis.yaml:29","Info: topLevel 'contents' permission set to 'read': .github/workflows/dependency_review.yaml:19","Info: found token with 'none' permissions: .github/workflows/release.yaml:1","Info: topLevel permissions set to 'read-all': .github/workflows/scorecard.yaml:26","Info: found token with 'none' permissions: .github/workflows/tests.yaml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#token-permissions"}},{"name":"Code-Review","score":10,"reason":"all changesets reviewed","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#code-review"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#dangerous-workflow"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#binary-artifacts"}},{"name":"Pinned-Dependencies","score":9,"reason":"dependency not pinned by hash detected -- score normalized to 9","details":["Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yaml:76: update your workflow using https://app.stepsecurity.io/secureworkflow/sigstore/timestamp-authority/release.yaml/main?enable=pin","Warn: goCommand not pinned by hash: test/fuzz/oss_fuzz_build.sh:17","Info: 20 out of 20 GitHub-owned GitHubAction dependencies pinned","Info: 12 out of 13 third-party GitHubAction dependencies pinned","Info: 3 out of 3 containerImage dependencies pinned","Info: 2 out of 3 goCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#pinned-dependencies"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#cii-best-practices"}},{"name":"Vulnerabilities","score":7,"reason":"3 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2022-0635","Warn: Project is vulnerable to: GO-2022-0646","Warn: Project is vulnerable to: GO-2025-3770"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#vulnerabilities"}},{"name":"Fuzzing","score":10,"reason":"project is fuzzed","details":["Info: OSSFuzz integration found","Info: GoBuiltInFuzzer integration found: pkg/api/timestamp_test.go:19","Info: GoBuiltInFuzzer integration found: pkg/api/timestamp_test.go:25"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#fuzzing"}},{"name":"Signed-Releases","score":10,"reason":"5 out of the last 5 releases have a total of 10 signed artifacts.","details":["Info: signed release artifact: timestamp-authority_checksums.txt-keyless.sig: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.9","Info: signed release artifact: timestamp-authority_checksums.txt-keyless.sig: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.8","Info: signed release artifact: timestamp-authority_checksums.txt-keyless.sig: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.7","Info: signed release artifact: timestamp-authority_checksums.txt-keyless.sig: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.6","Info: signed release artifact: timestamp-authority_checksums.txt-keyless.sig: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.5","Info: provenance for release artifact: multiple.intoto.jsonl: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.9","Info: provenance for release artifact: multiple.intoto.jsonl: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.8","Info: provenance for release artifact: multiple.intoto.jsonl: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.7","Info: provenance for release artifact: multiple.intoto.jsonl: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.6","Info: provenance for release artifact: multiple.intoto.jsonl: https://github.com/sigstore/timestamp-authority/releases/tag/v1.2.5"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#signed-releases"}},{"name":"Packaging","score":10,"reason":"packaging workflow detected","details":["Info: Project packages its releases by way of GitHub Actions.: .github/workflows/build-snapshot.yaml:9"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#packaging"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: some github tokens can't read classic branch protection rules: https://github.com/ossf/scorecard-action/blob/main/docs/authentication/fine-grained-auth-token.md","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#branch-protection"}},{"name":"SAST","score":10,"reason":"SAST tool is run on all commits","details":["Info: SAST configuration detected: CodeQL","Info: all commits (30) are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#sast"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#license"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: github.com/sigstore/.github/SECURITY.md:1","Info: Found linked content: github.com/sigstore/.github/SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: github.com/sigstore/.github/SECURITY.md:1","Info: Found text in security policy: github.com/sigstore/.github/SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#security-policy"}},{"name":"CI-Tests","score":10,"reason":"28 out of 28 merged PRs checked by a CI test -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project runs tests before pull requests are merged.","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#ci-tests"}},{"name":"Contributors","score":10,"reason":"project has 19 contributing companies or organizations","details":["Info: found contributions from: chainguard-dev, chainguard-images, distroless, falcosecurity, fosdem-testingautomation, google, googlers, helm, honk-ci, jaegertracing, ko-build, kubernetes, kubernetes-nightly, kubernetes-sigs, openvex, protobom, sigstore, theupdateframework, wolfi-dev"],"documentation":{"short":"Determines if the project has a set of contributors from multiple organizations (e.g., companies).","url":"https://github.com/ossf/scorecard/blob/c22063e786c11f9dd714d777a687ff7c4599b600/docs/checks.md#contributors"}}]}