|
| 1 | +header: |
| 2 | + schema-version: 2.2.0 |
| 3 | + last-updated: '2026-02-25' |
| 4 | + last-reviewed: '2026-02-25' |
| 5 | + url: https://raw.githubusercontent.com/cloudnative-pg/postgres-containers/main/SECURITY-INSIGHTS.yml |
| 6 | + # reference the main SECURITY-INSIGHTS file from CNPG repo |
| 7 | + project-si-source: https://raw.githubusercontent.com/cloudnative-pg/cloudnative-pg/main/SECURITY-INSIGHTS.yml |
| 8 | + |
| 9 | +repository: |
| 10 | + url: https://github.com/cloudnative-pg/postgres-containers |
| 11 | + status: active |
| 12 | + accepts-change-request: true |
| 13 | + accepts-automated-change-request: true |
| 14 | + no-third-party-packages: false |
| 15 | + core-team: |
| 16 | + - name: Gabriele Bartolini |
| 17 | + email: gabriele.bartolini@enterprisedb.com |
| 18 | + primary: true |
| 19 | + - name: Francesco Canovai |
| 20 | + email: francesco.canovai@enterprisedb.com |
| 21 | + primary: false |
| 22 | + - name: Jonathan Gonzalez V. |
| 23 | + email: jonathan.gonzalez@enterprisedb.com |
| 24 | + primary: false |
| 25 | + - name: Marco Nenciarini |
| 26 | + email: marco.nenciarini@enterprisedb.com |
| 27 | + primary: false |
| 28 | + - name: Niccolò Fei |
| 29 | + email: niccolo.fei@enterprisedb.com |
| 30 | + primary: false |
| 31 | + license: |
| 32 | + url: https://www.apache.org/licenses/LICENSE-2.0 |
| 33 | + expression: Apache-2.0 |
| 34 | + |
| 35 | + release: |
| 36 | + automated-pipeline: true |
| 37 | + distribution-points: |
| 38 | + - uri: https://github.com/cloudnative-pg/postgres-containers/pkgs/container/postgresql |
| 39 | + comment: GitHub packages for Postgres container images |
| 40 | + |
| 41 | + security: |
| 42 | + tools: |
| 43 | + - name: Dockle |
| 44 | + type: container |
| 45 | + rulesets: ["default"] |
| 46 | + results: {} |
| 47 | + comment: Lints container images for security best practices. |
| 48 | + integration: |
| 49 | + adhoc: false |
| 50 | + ci: true |
| 51 | + release: false |
| 52 | + - name: Dependabot |
| 53 | + type: SCA |
| 54 | + rulesets: ["default"] |
| 55 | + results: {} |
| 56 | + integration: |
| 57 | + adhoc: true |
| 58 | + ci: false |
| 59 | + release: false |
| 60 | + - name: Renovate |
| 61 | + type: SCA |
| 62 | + rulesets: ["default"] |
| 63 | + results: {} |
| 64 | + integration: |
| 65 | + adhoc: true |
| 66 | + ci: true |
| 67 | + release: false |
| 68 | + - name: Snyk |
| 69 | + type: container |
| 70 | + rulesets: ["default"] |
| 71 | + results: {} |
| 72 | + comment: Scans container images for known vulnerabilities. |
| 73 | + integration: |
| 74 | + adhoc: false |
| 75 | + ci: true |
| 76 | + release: true |
| 77 | + - name: Cosign |
| 78 | + type: container |
| 79 | + rulesets: ["default"] |
| 80 | + results: {} |
| 81 | + comment: Used to cryptographically sign container images. |
| 82 | + integration: |
| 83 | + adhoc: false |
| 84 | + ci: true |
| 85 | + release: true |
| 86 | + - name: GitHub Code Scanning |
| 87 | + type: SAST |
| 88 | + rulesets: ["default"] |
| 89 | + results: {} |
| 90 | + comment: Ingests SARIF results from Snyk and Trivy for integrated GitHub security alerts. |
| 91 | + integration: |
| 92 | + adhoc: false |
| 93 | + ci: true |
| 94 | + release: true |
| 95 | + - name: Trivy |
| 96 | + type: container |
| 97 | + rulesets: ["default"] |
| 98 | + results: {} |
| 99 | + comment: | |
| 100 | + Scans container images and file systems for vulnerabilities and |
| 101 | + misconfigurations. |
| 102 | + integration: |
| 103 | + adhoc: false |
| 104 | + ci: true |
| 105 | + release: true |
| 106 | + |
| 107 | + assessments: |
| 108 | + self: |
| 109 | + comment: Refer to the main project. |
0 commit comments