Go module
github.com/sigstore/cosign
history
arrow_drop_downv1.13.1
Newer version availablewarning
Warning
The highest tagged major version of this Go module is github.com/sigstore/cosign/v2.
Security Advisories
22
In this package
Similar advisories
Cosign vulnerable to possible endless data attack from attacker-controlled registry
3.1 LOW·GHSA-vfp6-jrw2-99g9
Similar advisories
Cosign malicious attachments can cause system-wide denial of service
4.2 MODERATE·GHSA-88jx-383q-w4qc
Similar advisories
Cosign malicious artifacts can cause machine-wide DoS
4.2 MODERATE·GHSA-95pr-fxf5-86gv
In the dependencies
Similar advisories
Docker Swarm encrypted overlay network with a single endpoint is unauthenticated
6.8 MODERATE·GHSA-6wrf-mxfj-pf5p
Docker Swarm encrypted overlay network traffic may be unencrypted
6.8 MODERATE·GHSA-33pg-m6jh-5237
Docker Swarm encrypted overlay network may be unauthenticated
7.5 HIGH·GHSA-232p-vwff-86mp
Similar advisories
Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions
6.3 MODERATE·GHSA-rc4r-wh2q-q6c4
Similar advisories
Container build can leak any path on the host into the container
LOW·GHSA-vp35-85q5-9f25
Similar advisories
Rekor's compressed archives can result in OOM conditions
7.5 HIGH·GHSA-2h5h-59f5-c5x9
Similar advisories
malformed proposed intoto entries can cause a panic
5.3 MODERATE·GHSA-frqx-jfcm-6jjr
Similar advisories
Classic builder cache poisoning
6.9 MODERATE·GHSA-xw73-rw38-6vjc
Similar advisories
Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)
4.3 MODERATE·GHSA-c5q2-7r4c-mv6g
Similar advisories
go-retryablehttp can leak basic auth credentials to log files
6 MODERATE·GHSA-v6v8-xj6m-xwqh
Similar advisories
OPA for Windows has an SMB force-authentication vulnerability
6.1 MODERATE·GHSA-c77r-fh37-x2px
Similar advisories
Similar advisories
Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
9.1 CRITICAL·GHSA-v778-237x-gjrc
Similar advisories
Non-linear parsing of case-insensitive content in golang.org/x/net/html
HIGH·GHSA-w32m-9786-jp63
distribution catalog API endpoint can lead to OOM via malicious user input
7.5 HIGH·GHSA-hqxw-f8mx-cpmw
/sys/devices/virtual/powercap accessible by default to containers
MODERATE·GHSA-jq35-85cj-fj4p
Moby's external DNS requests from 'internal' networks could lead to data exfiltration
5.9 MODERATE·GHSA-mq39-4gv4-mvpx
Links
- Origin
- Repo
Projects
sigstore/cosign
GitHub
Code signing and transparency for containers and binaries
call_split 551 forks
star 5k stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
8/10
Scorecard as of .
Code-Review
10/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
all changesets reviewed
Maintained
10/10
Determines if the project is "actively maintained".
Reasoning
30 commit(s) and 10 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices
2/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
badge detected: InProgress
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
Fuzzing
10/10
Determines if the project uses fuzzing.
Reasoning
project is fuzzed
Pinned-Dependencies
8/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 8
Security-Policy
10/10
Determines if the project has published a security policy.
Reasoning
security policy file detected
Signed-Releases
8/10
Determines if the project cryptographically signs release artifacts.
Reasoning
5 out of the last 5 releases have a total of 5 signed artifacts.
SAST
7/10
Determines if the project uses static code analysis.
Reasoning
SAST tool detected but not run on all commits
Vulnerabilities
7/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
3 existing vulnerabilities detected
Project metadata as of .