Skip to content

fix: improve OSV config for OSSF Scorecard #3119

Open
@terriko

Description

@terriko

The scorecard is giving us a lower score because it claims we have OSV vulnerabililities:

A sampling:

Warn: Project is vulnerable to: RUSTSEC-2021-0139
Warn: Project is vulnerable to: RUSTSEC-2021-0145
Warn: Project is vulnerable to: GHSA-f85w-wvc7-crwc / RUSTSEC-2022-0078
Warn: Project is vulnerable to: RUSTSEC-2020-0159
Warn: Project is vulnerable to: GHSA-jqwc-c49r-4w2x
Warn: Project is vulnerable to: GHSA-7f6x-jwh5-m9r4
Warn: Project is vulnerable to: RUSTSEC-2020-0168
Warn: Project is vulnerable to: GHSA-3gxf-9r58-2ghg / RUSTSEC-2023-0022
Warn: Project is vulnerable to: GHSA-6hcf-g6gr-hhcr / RUSTSEC-2023-0024
Warn: Project is vulnerable to: GHSA-9qwg-crg9-m2vc / RUSTSEC-2023-0023
Warn: Project is vulnerable to: GHSA-xcf7-rvmh-g6q4

We don't actually use rust, for example, so these are almost certainly all coming from test/language_data which should not be scanned. There's some notes suggesting that we could add a config to improve these results and I'm hoping that this means that (unlike with dependabot) we could tell it not to scan that directory. If anyone's got time to look up how to do that config, that would be great.

Metadata

Metadata

Assignees

Labels

CIRelated to our continuous integration service (GitHub Actions)securitypublic security-related issues.

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions