遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/4618)
<a href="https://www.bestpractices.dev/projects/4618"><img src="https://www.bestpractices.dev/projects/4618/badge"></a>
A suite of tools to assist with reviewing Open Source Software dependencies.
https://github.com/oss-review-toolkit/ort/blob/master/CONTRIBUTING.md
DCO bot integrated into PRS, see https://github.com/oss-review-toolkit/ort/runs/27212646480 and https://github.com/oss-review-toolkit/.github/blob/main/CONTRIBUTING.md#signing-off-each-commit.
See https://github.com/oss-review-toolkit/ort-governance/.
See https://github.com/oss-review-toolkit/.github/blob/main/CODE_OF_CONDUCT.md and also https://github.com/oss-review-toolkit/ort/community.
See https://github.com/oss-review-toolkit/ort-governance/?tab=readme-ov-file#rules.
The Technical Steering Committee members have access to a shared password manager at https://1password.com/. For security reasons the full URL is not shared.
Partly see the previous question. The project has proven over the past years to stay healthy and active even if certain maintainers stop to contribute / lower their contribution rate. See https://github.com/oss-review-toolkit/ort/graphs/contributors for more than 2 active maintainers.
See https://github.com/orgs/oss-review-toolkit/projects/3.
See https://oss-review-toolkit.org/ort/docs/intro.
See https://oss-review-toolkit.org/ort/docs/category/getting-started.
Documentation is generally current, defects are treated as regular issues at https://github.com/oss-review-toolkit/ort/issues?q=is%3Aopen+is%3Aissue+label%3Adocumentation.
See https://github.com/oss-review-toolkit/ort#readme.
Keys for making releases are stored as GitHub secrets, see e.g. https://github.com/oss-review-toolkit/ort/blob/72d929155da0d378537268a78465932c99acd265/.github/workflows/release.yml#L37-L42.
Past releases are available at https://github.com/oss-review-toolkit/ort/releases, and ORT offers a migration tool at https://github.com/oss-review-toolkit/ort/blob/72d929155da0d378537268a78465932c99acd265/plugins/commands/migrate/src/main/kotlin/MigrateCommand.kt#L45.
https://github.com/oss-review-toolkit/ort/issues
No vulnerabilities were reported in the last 12 months.
Generally see https://github.com/oss-review-toolkit/.github/blob/main/CONTRIBUTING.md#coding-conventions.
See https://github.com/oss-review-toolkit/ort/blob/main/.github/workflows/static-analysis.yml.
No native binaries are being generated, ORT targets the JVM only currently.
Not applicable for targeting the JVM.
Taken care of the the Gradle build system.
Special configuration is in place for reproducible builds, see https://github.com/oss-review-toolkit/ort/blob/72d929155da0d378537268a78465932c99acd265/buildSrc/src/main/kotlin/ort-base-conventions.gradle.kts#L45-L49.
There is no common convention for JVM-based applications, other than just unzipping the distribution archive.
The Gradle build system is configured to bootstrap all dependencies. Also, ORT provides a "requirements" command for assistance: https://github.com/oss-review-toolkit/ort/blob/72d929155da0d378537268a78465932c99acd265/plugins/commands/requirements/src/main/kotlin/RequirementsCommand.kt#L60
See https://github.com/oss-review-toolkit/ort/blob/main/gradle/libs.versions.toml.
GitHub security advisories are active, see https://github.com/oss-review-toolkit/ort/security. Additionally, Sonatype performs security scans when publishing release artifacts to Maven Central.
Renovate bot is configured, see e.g. https://github.com/oss-review-toolkit/ort/pull/8847.
We address respective inspection hints by IntelliJ IDEA or CodeQL.
See https://github.com/oss-review-toolkit/ort/blob/main/.github/workflows/build-and-test.yml.
We often ask bug reporters for reproducers that are used as tests.
https://github.com/oss-review-toolkit/ort/blob/833dac3d71065dc1f4cc44cf76e57edbaedea1cf/buildSrc/src/main/kotlin/ort-kotlin-conventions.gradle.kts#L175 https://github.com/oss-review-toolkit/ort/blob/833dac3d71065dc1f4cc44cf76e57edbaedea1cf/gradle.properties#L21
We rely on third-party dependencies like JGIt to manage credentials for cloning Git repositories. JGit in turn uses Apache Mina for SSH access, which uses the standard locations to look up e.g. private keys.
Secure transport is always preferred. We use mature libraries like OkHttp for making use of these.
Secure connections are validated against the JVM's / system certificate store.
Released JARs are signed, see https://github.com/oss-review-toolkit/ort/blob/72d929155da0d378537268a78465932c99acd265/.github/workflows/release.yml#L44-L48.
We filter e.g. environment variables, see https://github.com/oss-review-toolkit/ort/blob/72d929155da0d378537268a78465932c99acd265/utils/common/src/main/kotlin/EnvironmentVariableFilter.kt#L59-L79.
Not applicable for a locally running JVM application.
See https://github.com/oss-review-toolkit/ort/blob/main/.github/workflows/static-analysis.yml and https://github.com/oss-review-toolkit/ort/blob/main/.github/codeql/codeql-config.yml.
Not applicable for a JVM application.
后退