Skip to content

Commit 8808af1

Browse files
gbartolinimnencia
andauthored
chore: add basic SECURITY-INSIGHTS.YAML file (#402)
Shares the main project SI file. Relates cloudnative-pg/cloudnative-pg#10057 Signed-off-by: Gabriele Bartolini <gabriele.bartolini@enterprisedb.com> Signed-off-by: Marco Nenciarini <marco.nenciarini@enterprisedb.com> Co-authored-by: Marco Nenciarini <marco.nenciarini@enterprisedb.com>
1 parent 63724c6 commit 8808af1

1 file changed

Lines changed: 109 additions & 0 deletions

File tree

SECURITY-INSIGHTS.yml

Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
header:
2+
schema-version: 2.2.0
3+
last-updated: '2026-02-25'
4+
last-reviewed: '2026-02-25'
5+
url: https://raw.githubusercontent.com/cloudnative-pg/postgres-containers/main/SECURITY-INSIGHTS.yml
6+
# reference the main SECURITY-INSIGHTS file from CNPG repo
7+
project-si-source: https://raw.githubusercontent.com/cloudnative-pg/cloudnative-pg/main/SECURITY-INSIGHTS.yml
8+
9+
repository:
10+
url: https://github.com/cloudnative-pg/postgres-containers
11+
status: active
12+
accepts-change-request: true
13+
accepts-automated-change-request: true
14+
no-third-party-packages: false
15+
core-team:
16+
- name: Gabriele Bartolini
17+
email: gabriele.bartolini@enterprisedb.com
18+
primary: true
19+
- name: Francesco Canovai
20+
email: francesco.canovai@enterprisedb.com
21+
primary: false
22+
- name: Jonathan Gonzalez V.
23+
email: jonathan.gonzalez@enterprisedb.com
24+
primary: false
25+
- name: Marco Nenciarini
26+
email: marco.nenciarini@enterprisedb.com
27+
primary: false
28+
- name: Niccolò Fei
29+
email: niccolo.fei@enterprisedb.com
30+
primary: false
31+
license:
32+
url: https://www.apache.org/licenses/LICENSE-2.0
33+
expression: Apache-2.0
34+
35+
release:
36+
automated-pipeline: true
37+
distribution-points:
38+
- uri: https://github.com/cloudnative-pg/postgres-containers/pkgs/container/postgresql
39+
comment: GitHub packages for Postgres container images
40+
41+
security:
42+
tools:
43+
- name: Dockle
44+
type: container
45+
rulesets: ["default"]
46+
results: {}
47+
comment: Lints container images for security best practices.
48+
integration:
49+
adhoc: false
50+
ci: true
51+
release: false
52+
- name: Dependabot
53+
type: SCA
54+
rulesets: ["default"]
55+
results: {}
56+
integration:
57+
adhoc: true
58+
ci: false
59+
release: false
60+
- name: Renovate
61+
type: SCA
62+
rulesets: ["default"]
63+
results: {}
64+
integration:
65+
adhoc: true
66+
ci: true
67+
release: false
68+
- name: Snyk
69+
type: container
70+
rulesets: ["default"]
71+
results: {}
72+
comment: Scans container images for known vulnerabilities.
73+
integration:
74+
adhoc: false
75+
ci: true
76+
release: true
77+
- name: Cosign
78+
type: container
79+
rulesets: ["default"]
80+
results: {}
81+
comment: Used to cryptographically sign container images.
82+
integration:
83+
adhoc: false
84+
ci: true
85+
release: true
86+
- name: GitHub Code Scanning
87+
type: SAST
88+
rulesets: ["default"]
89+
results: {}
90+
comment: Ingests SARIF results from Snyk and Trivy for integrated GitHub security alerts.
91+
integration:
92+
adhoc: false
93+
ci: true
94+
release: true
95+
- name: Trivy
96+
type: container
97+
rulesets: ["default"]
98+
results: {}
99+
comment: |
100+
Scans container images and file systems for vulnerabilities and
101+
misconfigurations.
102+
integration:
103+
adhoc: false
104+
ci: true
105+
release: true
106+
107+
assessments:
108+
self:
109+
comment: Refer to the main project.

0 commit comments

Comments
 (0)