Get an Open Source Security Foundation badge for Drupal (core? contrib?)

Created on 4 February 2022, over 3 years ago
Updated 7 March 2024, over 1 year ago

Attached is a PDF of the questions we'll need to answer. They are...lengthy.

It's also visible online in a partially completed state at https://bestpractices.coreinfrastructure.org/en/projects/5602

Problem/Motivation

Steps to reproduce

Proposed resolution

Remaining tasks

User interface changes

API changes

Data model changes

πŸ“Œ Task
Status

Needs review

Version

1.0

Component

Miscellaneous

Created by

πŸ‡ΊπŸ‡ΈUnited States greggles Denver, Colorado, USA

Live updates comments and jobs are added and updated live.
Sign in to follow issues

Comments & Activities

Not all content is available!

It's likely this issue predates Contrib.social: some issue and comment data are missing.

  • πŸ‡ΊπŸ‡ΈUnited States fen

    Came across this - great work getting Drupal to 96%! Quick review, all looks good. The URL has changed, now: https://www.bestpractices.dev/en/projects/5602

    Re: Dynamic Code Analysis, I know of several teams that have integrated OWASP ZAP into the build/test pipeline. Not sure how d.o is set up, but if it could be added that would notch us up another point or two. :-)

  • πŸ‡ΊπŸ‡ΈUnited States greggles Denver, Colorado, USA

    Thanks, fen. Drupal is now using gitlab CI so if you have ideas on configuring gitlab to do that scan that would be great.

    Updating the issue summary for the new URL and to list out the items we haven't yet answered as "meets" or "N/A"

    I'm at Open Source Software North America conference and will try to connect with some folks who work on OpenSSF to get advice on these.

  • πŸ‡ΊπŸ‡ΈUnited States cmlara

    I should note Drupal may not technically be able to answer "yes" to "Publicly known vulnerabilities fixed"

    Drupal Core likely breached the timeline with CVE-2024-45440 which took untiill at least Decmeber 4th to commit to the D7 repo.

    There is still an open second part in πŸ› Maintenance Pages leak sensitive environment information - pt2 Active .

    If we ignore that for a moment, we should also consider that there are a large number of issues that are public that may qualify for a CVE if escalate through the CNA dispute process. At the moment they would not technically disqualify Drupal, however is it in the best interest of the project to assert a strong security focus if it has not resolved those open issues?

Production build 0.71.5 2024