-
Notifications
You must be signed in to change notification settings - Fork 226
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
content: source track: address org threats #1236
base: main
Are you sure you want to change the base?
content: source track: address org threats #1236
Conversation
✅ Deploy Preview for slsa ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Copilot reviewed 1 out of 1 changed files in this pull request and generated no suggestions.
Comments skipped due to low confidence (2)
docs/spec/draft/threats.md:86
- [nitpick] The word 'SHOULD' should not be in all caps unless it is a specific requirement in a specification. Consider changing it to 'should'.
Trustworthiness scales with transparency, and consumers SHOULD push on their vendors to follow transparency best-practices.
docs/spec/draft/threats.md:86
- [nitpick] The phrase 'Trustworthiness scales with transparency' is unclear. Consider rephrasing it to 'Trustworthiness increases with transparency'.
Trustworthiness scales with transparency, and consumers SHOULD push on their vendors to follow transparency best-practices.
Tip: Turn on automatic Copilot reviews for this repository to get quick feedback on every pull request. Learn more
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just the one comment, otherwise this looks great!
Co-authored-by: Tom Hennen <[email protected]> Signed-off-by: Zachariah Cox <[email protected]>
@@ -76,25 +76,20 @@ be nice to resolve. For example, compromised developer credentials - is that (A) | |||
or (B)? | |||
--> | |||
|
|||
<details><summary>Software producer intentionally submits bad code</summary> | |||
<details><summary>The organization intentionally creates a malicious revision</summary> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there a reason to switch the terminology to "organization" from "producer"? Organization seems narrower to me, and the figure also uses producer.
fixes: #1178
I'm not sure how much we need this threats.md section.
We already have a generic blurb here that covers much the same topic: https://github.com/slsa-framework/slsa/blob/5fea409bc055bb0e593950b23a256422ee8b3ba5/docs/spec/draft/about.md#what-slsa-doesnt-cover