feat: add image signing, vulnerability scanning, and security policy
- Add Cosign image signing using Sigstore keyless signing - Add Trivy vulnerability scanning with SARIF output to GitHub Security tab - Add SECURITY.md with vulnerability reporting instructions - Add required permissions for security-events and id-token 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>pull/106/head
parent
0a25ef9016
commit
291bf7d765
@ -0,0 +1,41 @@
|
||||
# Security Policy
|
||||
|
||||
## Supported Versions
|
||||
|
||||
| Version | Supported |
|
||||
| ------- | ------------------ |
|
||||
| latest | :white_check_mark: |
|
||||
| < 2.0 | :x: |
|
||||
|
||||
## Reporting a Vulnerability
|
||||
|
||||
If you discover a security vulnerability in this project, please report it responsibly:
|
||||
|
||||
1. **Do not** open a public GitHub issue for security vulnerabilities
|
||||
2. Email the maintainer directly or use [GitHub's private vulnerability reporting](https://github.com/weirdtangent/amcrest2mqtt/security/advisories/new)
|
||||
3. Include as much detail as possible:
|
||||
- Description of the vulnerability
|
||||
- Steps to reproduce
|
||||
- Potential impact
|
||||
- Suggested fix (if any)
|
||||
|
||||
You can expect an initial response within 48 hours. We will work with you to understand and address the issue promptly.
|
||||
|
||||
## Security Measures
|
||||
|
||||
This project implements several security measures:
|
||||
|
||||
- **SBOM (Software Bill of Materials)**: Every Docker image includes a complete list of dependencies
|
||||
- **Provenance Attestation**: Build provenance is attached to images to verify where and how they were built
|
||||
- **Image Signing**: Images are signed using [Sigstore Cosign](https://www.sigstore.dev/) for authenticity verification
|
||||
- **Vulnerability Scanning**: Images are scanned with [Trivy](https://trivy.dev/) for known vulnerabilities
|
||||
|
||||
### Verifying Image Signatures
|
||||
|
||||
You can verify the signature of our Docker images using cosign:
|
||||
|
||||
```bash
|
||||
cosign verify graystorm/amcrest2mqtt:latest \
|
||||
--certificate-identity-regexp="https://github.com/weirdtangent/amcrest2mqtt" \
|
||||
--certificate-oidc-issuer="https://token.actions.githubusercontent.com"
|
||||
```
|
||||
Loading…
Reference in New Issue