You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Address third-round review on workflows + SECURITY.md
Critical:
- release-sign: verify cosign sign-blob outputs are non-empty before
upload — cosign exits 0 on partial writes, which would otherwise ship
a zero-byte .sig/.pem to a published release.
Important:
- release-sign: verify dispatched tag both exists on origin and has a
published release before signing; refuse to sign arbitrary refs from
workflow_dispatch.
- release-sign: refuse to clobber existing signed assets on re-run.
--clobber silently overwrote them; now fails loudly with a copy-paste
cleanup hint so an operator decides whether to delete first.
- release-sign: tighten semver regex so v1.2.3.foo is rejected (the
prior `[.-]` alternation let it through).
- trivy: fail loudly when SARIF generation produced no file. The prior
hashFiles guard skipped upload silently, leaving the code-scanning
dashboard stale on scanner crash.
- trivy + shellcheck: add fork-PR fallback jobs that run the scanner
without SARIF upload / PR-comment posting, so external contributions
still get gated on secrets, vulns, misconfig, and shell warnings.
- build-image: cosign verify the just-signed image against Rekor to
catch transient Fulcio/Rekor write failures that cosign sign itself
doesn't propagate.
Cleanup:
- build-image: rewrite "provenance/sbom no-ops bij push: false" comment
so a future maintainer doesn't strip the unconditional flags; add
id-token: write to the local-permission-escalation note.
- scorecard: log the trigger and whether publish_results actually took
effect, so a stale badge isn't silently caused by an unpublishable
branch_protection_rule run.
- SECURITY.md: document which release asset to cosign verify (the
signed tar.gz, not GitHub's auto-generated Source code archive);
switch the MinBZK CIO-office reference from backticks to quotes
since it isn't a GitHub path.
- CONTRIBUTING.md: soften the "moet groen / moeten zijn opgelost"
language since branch protection isn't enforcing the gate yet.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Copy file name to clipboardExpand all lines: SECURITY.md
+27-2Lines changed: 27 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,8 @@ Voor verantwoorde melding van kwetsbaarheden volgen we het beleid van het Minist
7
7
8
8
Vermeld in je melding **beide** referenties zodat de melding via MinBZK CIO-office bij de juiste maintainers terechtkomt:
9
9
10
-
1.`MinBZK/CIO-office github security response` — conform het MinBZK-beleid
11
-
2. de repository `RijksICTGilde/hackathon-claude-code` — voor directe routering naar de maintainers
10
+
1."MinBZK/CIO-office github security response" — conform het MinBZK-beleid (vrije-tekstreferentie, geen GitHub-pad)
11
+
2. de repository [`RijksICTGilde/hackathon-claude-code`](https://github.com/RijksICTGilde/hackathon-claude-code) — voor directe routering naar de maintainers
12
12
13
13
## Reactietermijn
14
14
@@ -25,4 +25,29 @@ Conform het MinBZK-beleid (gebaseerd op NCSC) streven we naar:
25
25
- Misbruik de kwetsbaarheid niet verder dan nodig om het bestaan ervan aan te tonen.
26
26
- Wijzig of verwijder geen data op systemen.
27
27
28
+
## Verifiëren van release-artefacten
29
+
30
+
Bij elke gepubliceerde release tekent de `release-sign` workflow het bron-archief met cosign keyless. De release bevat vier assets:
31
+
32
+
-`<repo>-<tag>.tar.gz` — het ondertekende bron-archief
33
+
-`<repo>-<tag>.tar.gz.sig` — handtekening
34
+
-`<repo>-<tag>.tar.gz.pem` — Sigstore-certificaat
35
+
-`<repo>-<tag>.tar.gz.sha256` — SHA256-checksum
36
+
37
+
**Belangrijk:** verifieer alleen het `<repo>-<tag>.tar.gz` asset uit de release. GitHub's automatisch gegenereerde "Source code (tar.gz)" download is een ander archief en heeft een andere checksum — die handtekening werkt daar niet op.
0 commit comments