An open API service providing repository metadata for many open source software ecosystems.

GitHub / ClarkSource / k8t

Kubernetes manifest templating for multi cluster and environment deployments with code scaffolding.

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ClarkSource%2Fk8t
PURL: pkg:github/ClarkSource/k8t

Stars: 17
Forks: 4
Open issues: 10

License: isc
Language: Python
Size: 391 KB
Dependencies parsed at: Pending

Created at: almost 7 years ago
Updated at: 18 days ago
Pushed at: about 2 years ago
Last synced at: 5 days ago

Topics: jinja2, kubernetes, multi-cluster, templates

OpenSSF Scorecard report

6.2

Overall Score

10/10 Critical Risk
39/50 High Risk
7/40 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Code-Review
High Risk

all changesets reviewed

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE.txt:0
ℹ️ Info: FSF or OSI recognized license: ISC License: LICENSE.txt:0
10/10
Vulnerabilities
High Risk

0 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

9/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:28
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:29
⚠️ Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
ℹ️ Info: no jobLevel write permissions found
7/10
SAST
Medium Risk

SAST tool detected but not run on all commits

Determines if the project uses static code analysis.

Show details
ℹ️ Info: SAST configuration detected: CodeQL
⚠️ Warn: 0 commits out of 30 are checked with a SAST tool
0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Maintained
High Risk

0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0

Determines if the project is "actively maintained".

0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:42: update your workflow using https://app.stepsecurity.io/secureworkflow/ClarkSource/k8t/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:46: update your workflow using https://app.stepsecurity.io/secureworkflow/ClarkSource/k8t/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:57: update your workflow using https://app.stepsecurity.io/secureworkflow/ClarkSource/k8t/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:71: update your workflow using https://app.stepsecurity.io/secureworkflow/ClarkSource/k8t/codeql-analysis.yml/master?enable=pin
⚠️ Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating python:3-alpine to python:3-alpine@sha256:f196fd275fdad7287ccb4b0a85c2e402bb8c794d205cf6158909041c1ee9f38d
⚠️ Warn: pipCommand not pinned by hash: Dockerfile:12-20
⚠️ Warn: pipCommand not pinned by hash: Dockerfile:29-36
ℹ️ Info: 0 out of 4 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 0 out of 1 containerImage dependencies pinned
ℹ️ Info: 0 out of 2 pipCommand dependencies pinned
0/10
Security-Policy
Medium Risk

security policy file not detected

Determines if the project has published a security policy.

Show details
⚠️ Warn: no security policy file detected
⚠️ Warn: no security file to analyze
⚠️ Warn: no security file to analyze
⚠️ Warn: no security file to analyze
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Packaging
Not Applicable

packaging workflow not detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
⚠️ Warn: no GitHub/GitLab publishing workflow detected.
N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.