argo-cd
/
SECURITY-INSIGHTS.yml
128 строк · 5.2 Кб
1header:
2schema-version: 1.0.0
3expiration-date: '2024-10-31T00:00:00.000Z' # One year from initial release.
4last-updated: '2023-10-27'
5last-reviewed: '2023-10-27'
6commit-hash: b71277c6beb949d0199d647a582bc25822b88838
7project-url: https://github.com/argoproj/argo-cd
8project-release: v2.9.0-rc3
9changelog: https://github.com/argoproj/argo-cd/releases
10license: https://github.com/argoproj/argo-cd/blob/master/LICENSE
11project-lifecycle:
12status: active
13roadmap: https://github.com/orgs/argoproj/projects/25
14bug-fixes-only: false
15core-maintainers:
16- https://github.com/argoproj/argoproj/blob/master/MAINTAINERS.md
17release-cycle: https://argo-cd.readthedocs.io/en/stable/developer-guide/release-process-and-cadence/
18release-process: https://argo-cd.readthedocs.io/en/stable/developer-guide/release-process-and-cadence/#release-process
19contribution-policy:
20accepts-pull-requests: true
21accepts-automated-pull-requests: true
22automated-tools-list:
23- automated-tool: dependabot
24action: allowed
25path:
26- /
27- automated-tool: snyk-report
28action: allowed
29path:
30- docs/snyk
31comment: |
32This tool runs Snyk and generates a report of vulnerabilities in the project's dependencies. The report is
33placed in the project's documentation. The workflow is defined here:
34https://github.com/argoproj/argo-cd/blob/master/.github/workflows/update-snyk.yaml
35contributing-policy: https://argo-cd.readthedocs.io/en/stable/developer-guide/code-contributions/
36code-of-conduct: https://github.com/cncf/foundation/blob/master/code-of-conduct.md
37documentation:
38- https://argo-cd.readthedocs.io/
39distribution-points:
40- https://github.com/argoproj/argo-cd/releases
41- https://quay.io/repository/argoproj/argocd
42security-artifacts:
43threat-model:
44threat-model-created: true
45evidence-url:
46- https://github.com/argoproj/argoproj/blob/master/docs/argo_threat_model.pdf
47- https://github.com/argoproj/argoproj/blob/master/docs/end_user_threat_model.pdf
48self-assessment:
49self-assessment-created: false
50comment: |
51An extensive self-assessment was performed for CNCF graduation. Because the self-assessment process was evolving
52at the time, no standardized document has been published.
53security-testing:
54- tool-type: sca
55tool-name: Dependabot
56tool-version: "2"
57tool-url: https://github.com/dependabot
58integration:
59ad-hoc: false
60ci: false
61before-release: false
62tool-rulesets:
63- https://github.com/argoproj/argo-cd/blob/master/.github/dependabot.yml
64- tool-type: sca
65tool-name: Snyk
66tool-version: latest
67tool-url: https://snyk.io/
68integration:
69ad-hoc: true
70ci: true
71before-release: false
72- tool-type: sast
73tool-name: CodeQL
74tool-version: latest
75tool-url: https://codeql.github.com/
76integration:
77ad-hoc: false
78ci: true
79before-release: false
80comment: |
81We use the default configuration with the latest version.
82security-assessments:
83- auditor-name: Trail of Bits
84auditor-url: https://trailofbits.com
85auditor-report: https://github.com/argoproj/argoproj/blob/master/docs/argo_security_final_report.pdf
86report-year: 2021
87- auditor-name: Ada Logics
88auditor-url: https://adalogics.com
89auditor-report: https://github.com/argoproj/argoproj/blob/master/docs/argo_security_audit_2022.pdf
90report-year: 2022
91- auditor-name: Ada Logics
92auditor-url: https://adalogics.com
93auditor-report: https://github.com/argoproj/argoproj/blob/master/docs/audit_fuzzer_adalogics_2022.pdf
94report-year: 2022
95comment: |
96Part of the audit was performed by Ada Logics, focussed on fuzzing.
97- auditor-name: Chainguard
98auditor-url: https://chainguard.dev
99auditor-report: https://github.com/argoproj/argoproj/blob/master/docs/software_supply_chain_slsa_assessment_chainguard_2023.pdf
100report-year: 2023
101comment: |
102Confirmed the project's release process as achieving SLSA (v0.1) level 3.
103security-contacts:
104- type: email
105value: cncf-argo-security@lists.cncf.io
106primary: true
107vulnerability-reporting:
108accepts-vulnerability-reports: true
109email-contact: cncf-argo-security@lists.cncf.io
110security-policy: https://github.com/argoproj/argo-cd/security/policy
111bug-bounty-available: true
112bug-bounty-url: https://hackerone.com/ibb/policy_scopes
113out-scope:
114- vulnerable and outdated components # See https://github.com/argoproj/argo-cd/blob/master/SECURITY.md#a-word-about-security-scanners
115- security logging and monitoring failures
116dependencies:
117third-party-packages: true
118dependencies-lists:
119- https://github.com/argoproj/argo-cd/blob/master/go.mod
120- https://github.com/argoproj/argo-cd/blob/master/Dockerfile
121- https://github.com/argoproj/argo-cd/blob/master/ui/package.json
122sbom:
123- sbom-file: https://github.com/argoproj/argo-cd/releases # Every release's assets include SBOMs.
124sbom-format: SPDX
125dependencies-lifecycle:
126policy-url: https://argo-cd.readthedocs.io/en/stable/developer-guide/release-process-and-cadence/#dependencies-lifecycle-policy
127env-dependencies-policy:
128policy-url: https://argo-cd.readthedocs.io/en/stable/developer-guide/release-process-and-cadence/#dependencies-lifecycle-policy
129