Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

content: source track: address org threats #1236

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

zachariahcox
Copy link
Contributor

fixes: #1178

I'm not sure how much we need this threats.md section.
We already have a generic blurb here that covers much the same topic: https://github.com/slsa-framework/slsa/blob/5fea409bc055bb0e593950b23a256422ee8b3ba5/docs/spec/draft/about.md#what-slsa-doesnt-cover

Copy link

netlify bot commented Nov 18, 2024

Deploy Preview for slsa ready!

Name Link
🔨 Latest commit 4a5c7e6
🔍 Latest deploy log https://app.netlify.com/sites/slsa/deploys/673f5e6765be9100086c7e94
😎 Deploy Preview https://deploy-preview-1236--slsa.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copilot reviewed 1 out of 1 changed files in this pull request and generated no suggestions.

Comments skipped due to low confidence (2)

docs/spec/draft/threats.md:86

  • [nitpick] The word 'SHOULD' should not be in all caps unless it is a specific requirement in a specification. Consider changing it to 'should'.
Trustworthiness scales with transparency, and consumers SHOULD push on their vendors to follow transparency best-practices.

docs/spec/draft/threats.md:86

  • [nitpick] The phrase 'Trustworthiness scales with transparency' is unclear. Consider rephrasing it to 'Trustworthiness increases with transparency'.
Trustworthiness scales with transparency, and consumers SHOULD push on their vendors to follow transparency best-practices.

Tip: Turn on automatic Copilot reviews for this repository to get quick feedback on every pull request. Learn more

Copy link
Contributor

@TomHennen TomHennen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just the one comment, otherwise this looks great!

docs/spec/draft/threats.md Outdated Show resolved Hide resolved
Co-authored-by: Tom Hennen <[email protected]>
Signed-off-by: Zachariah Cox <[email protected]>
@@ -76,25 +76,20 @@ be nice to resolve. For example, compromised developer credentials - is that (A)
or (B)?
-->

<details><summary>Software producer intentionally submits bad code</summary>
<details><summary>The organization intentionally creates a malicious revision</summary>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a reason to switch the terminology to "organization" from "producer"? Organization seems narrower to me, and the figure also uses producer.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: 🆕 New
Status: No status
Development

Successfully merging this pull request may close these issues.

TODO: Need mitigation description for "Software producer intentionally submits bad code" threat
3 participants