遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/6532)
<a href="https://www.bestpractices.dev/projects/6532"><img src="https://www.bestpractices.dev/projects/6532/badge"></a>
Cagebreak: A Wayland Tiling Compositor Inspired by Ratpoison
https://github.com/project-repo/cagebreak/blob/master/README.md#governance
This has been achieved with release 2.0.0.
Repository on GitHub, which uses git. git is distributed.
https://github.com/project-repo/cagebreak/blob/master/CONTRIBUTING.md#good-first-contributions
Cagebreak does not use insecure 2FA.
https://github.com/project-repo/cagebreak/blob/master/CONTRIBUTING.md#review-requirements
https://github.com/project-repo/cagebreak/blob/master/CONTRIBUTING.md#reproducible-builds
meson test -C build/ is the standard under the meson build system and works for Cagebreak. See https://github.com/project-repo/cagebreak/blob/master/CONTRIBUTING.md#test-suite for details.
Found all required security hardening headers. https://securityheaders.com/?q=https%3A%2F%2Fgithub.com%2Fproject-repo%2Fcagebreak%2F&followRedirects=on
Since cagebreak does not really have an attack surface we conducted the review ourselves: https://github.com/project-repo/cagebreak/blob/master/SECURITY.md#threat-model Note that we restricted the socket permissions and forced the user to enable it explicitely. The release procedure includes static analysis (scan-build and fanalyzer) and dynamic analysis (fuzzing) regardless of any security review.
Undefined behaviour is sanitized during the fuzzing phase. Privileges are dropped irreversibly before any input is accepted (https://github.com/project-repo/cagebreak/blob/master/SECURITY.md#elevation-of-privilege)
https://github.com/project-repo/cagebreak/blob/master/CONTRIBUTING.md#fuzzing-1
Address sanitizer and undefined behaviour sanitizer are a form of automatic assertion, which is not enabled for release builds but used for pre-release testing.
后退