An open API service providing repository metadata for many open source software ecosystems.

GitHub / TelAPI / telapi-java

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/TelAPI%2Ftelapi-java
PURL: pkg:github/TelAPI/telapi-java

Stars: 2
Forks: 0
Open issues: 2

License: mit
Language: Java
Size: 729 KB
Dependencies parsed at: Pending

Created at: over 13 years ago
Updated at: about 10 years ago
Pushed at: about 10 years ago
Last synced at: 9 days ago

OpenSSF Scorecard report

1.7

Overall Score

10/50 High Risk
0/30 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
ℹ️ Info: FSF or OSI recognized license: MIT License: LICENSE:0
0/10
Branch-Protection
High Risk

branch protection not enabled on development/release branches

Determines if the default and release branches are protected with GitHub's branch protection settings.

Show details
⚠️ Warn: branch protection not enabled for branch 'master'
0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Code-Review
High Risk

Found 0/30 approved changesets -- score normalized to 0

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Maintained
High Risk

0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0

Determines if the project is "actively maintained".

0/10
SAST
Medium Risk

no SAST tool detected

Determines if the project uses static code analysis.

Show details
⚠️ Warn: no pull requests merged into dev branch
0/10
Security-Policy
Medium Risk

security policy file not detected

Determines if the project has published a security policy.

Show details
⚠️ Warn: no security policy file detected
⚠️ Warn: no security file to analyze
⚠️ Warn: no security file to analyze
⚠️ Warn: no security file to analyze
0/10
Vulnerabilities
High Risk

51 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

Show details
⚠️ Warn: Project is vulnerable to: GHSA-2p3x-qw9c-25hh
⚠️ Warn: Project is vulnerable to: GHSA-2q8x-2p7f-574v
⚠️ Warn: Project is vulnerable to: GHSA-3ccq-5vw3-2p6x
⚠️ Warn: Project is vulnerable to: GHSA-43gc-mjxg-gvrq
⚠️ Warn: Project is vulnerable to: GHSA-4cch-wxpw-8p28
⚠️ Warn: Project is vulnerable to: GHSA-4hrm-m67v-5cxr
⚠️ Warn: Project is vulnerable to: GHSA-56p8-3fh9-4cvq
⚠️ Warn: Project is vulnerable to: GHSA-59jw-jqf4-3wq3
⚠️ Warn: Project is vulnerable to: GHSA-64xx-cq4q-mf44
⚠️ Warn: Project is vulnerable to: GHSA-6w62-hx7r-mw68
⚠️ Warn: Project is vulnerable to: GHSA-6wf9-jmg9-vxcc
⚠️ Warn: Project is vulnerable to: GHSA-74cv-f58x-f9wf
⚠️ Warn: Project is vulnerable to: GHSA-7chv-rrw6-w6fc
⚠️ Warn: Project is vulnerable to: GHSA-7hwc-46rm-65jh
⚠️ Warn: Project is vulnerable to: GHSA-8jrj-525p-826v
⚠️ Warn: Project is vulnerable to: GHSA-cxfm-5m4g-x7xp
⚠️ Warn: Project is vulnerable to: GHSA-f554-x222-wgf7
⚠️ Warn: Project is vulnerable to: GHSA-f6hm-88x3-mfjv
⚠️ Warn: Project is vulnerable to: GHSA-f8cc-g7j8-xxpm
⚠️ Warn: Project is vulnerable to: GHSA-g5w6-mrj7-75h2
⚠️ Warn: Project is vulnerable to: GHSA-h7v4-7xg3-hxcc
⚠️ Warn: Project is vulnerable to: GHSA-hf23-9pf7-388p
⚠️ Warn: Project is vulnerable to: GHSA-hfq9-hggm-c56q
⚠️ Warn: Project is vulnerable to: GHSA-hph2-m3g5-xxv4
⚠️ Warn: Project is vulnerable to: GHSA-hrcp-8f3q-4w2c
⚠️ Warn: Project is vulnerable to: GHSA-hvv8-336g-rx3m
⚠️ Warn: Project is vulnerable to: GHSA-hwpc-8xqv-jvj4
⚠️ Warn: Project is vulnerable to: GHSA-j563-grx4-pjpv
⚠️ Warn: Project is vulnerable to: GHSA-j9h8-phrw-h4fh
⚠️ Warn: Project is vulnerable to: GHSA-jfvx-7wrx-43fh
⚠️ Warn: Project is vulnerable to: GHSA-mw36-7c6c-q4q2
⚠️ Warn: Project is vulnerable to: GHSA-p8pq-r894-fm8f
⚠️ Warn: Project is vulnerable to: GHSA-qpfq-ph7r-qv6f
⚠️ Warn: Project is vulnerable to: GHSA-qrx8-8545-4wg2
⚠️ Warn: Project is vulnerable to: GHSA-rgh3-987h-wpmw
⚠️ Warn: Project is vulnerable to: GHSA-rmr5-cpv2-vgjf
⚠️ Warn: Project is vulnerable to: GHSA-xw4p-crpj-vjx2
⚠️ Warn: Project is vulnerable to: GHSA-3832-9276-x7gf
⚠️ Warn: Project is vulnerable to: GHSA-2qrg-x229-3v8q
⚠️ Warn: Project is vulnerable to: GHSA-65fg-84f6-3jq3
⚠️ Warn: Project is vulnerable to: GHSA-f7vh-qwp3-x37m
⚠️ Warn: Project is vulnerable to: GHSA-fp5r-v3w9-4333
⚠️ Warn: Project is vulnerable to: GHSA-w9p3-5cr8-m3jj
⚠️ Warn: Project is vulnerable to: GHSA-2x83-r56g-cv47
⚠️ Warn: Project is vulnerable to: GHSA-7r82-7xv7-xcpj
⚠️ Warn: Project is vulnerable to: GHSA-cfh5-3ghh-wfjx
⚠️ Warn: Project is vulnerable to: GHSA-fmj5-wv96-r2ch
⚠️ Warn: Project is vulnerable to: GHSA-c27h-mcmw-48hv
⚠️ Warn: Project is vulnerable to: GHSA-r6j9-8759-g62w
⚠️ Warn: Project is vulnerable to: GHSA-pc54-pchm-xcw6
⚠️ Warn: Project is vulnerable to: GHSA-wxvr-vqfp-9cqw
N/A
Dangerous-Workflow
Not Applicable

no workflows found

Determines if the project's GitHub Action workflows avoid dangerous patterns.

N/A
Packaging
Not Applicable

packaging workflow not detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
⚠️ Warn: no GitHub/GitLab publishing workflow detected.
N/A
Pinned-Dependencies
Not Applicable

no dependencies found

Determines if the project has declared and pinned the dependencies of its build process.

N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.

N/A
Token-Permissions
Not Applicable

No tokens found

Determines if the project's workflows follow the principle of least privilege.