Go module

github.com/sigstore/cosign

v1.13.1

Newer version available
Warning
The highest tagged major version of this Go module is github.com/sigstore/cosign/v2.

Security Advisories

22
In the dependencies

Projects

sigstore/cosign

GitHub

Code signing and transparency for containers and binaries

 551 forks
 5k stars

OpenSSF scorecard

The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.

View information about checks and how to fix failures.

Score
8/10
Scorecard as of .
Code-Review
10/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
all changesets reviewed
Maintained
10/10
Determines if the project is "actively maintained".
Reasoning
30 commit(s) and 10 issue activity found in the last 90 days -- score normalized to 10
CII-Best-Practices
2/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
badge detected: InProgress
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
Fuzzing
10/10
Determines if the project uses fuzzing.
Reasoning
project is fuzzed
Pinned-Dependencies
8/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 8
Security-Policy
10/10
Determines if the project has published a security policy.
Reasoning
security policy file detected
Signed-Releases
8/10
Determines if the project cryptographically signs release artifacts.
Reasoning
5 out of the last 5 releases have a total of 5 signed artifacts.
SAST
7/10
Determines if the project uses static code analysis.
Reasoning
SAST tool detected but not run on all commits
Vulnerabilities
7/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
3 existing vulnerabilities detected

Project metadata as of .