An open API service providing repository metadata for many open source software ecosystems.

GitHub / commit-check / commit-check-action

Commit Check GitHub Action

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/commit-check%2Fcommit-check-action
PURL: pkg:github/commit-check/commit-check-action

Stars: 17
Forks: 2
Open issues: 5

License: mit
Language: Python
Size: 164 KB
Dependencies parsed at: Pending

Created at: almost 3 years ago
Updated at: 10 days ago
Pushed at: 10 days ago
Last synced at: 10 days ago

Topics: commit-check, commit-conventions, conventional-commits, github-actions

Funding Links https://github.com/sponsors/shenxianpeng

OpenSSF Scorecard report

4.8

Overall Score

10/10 Critical Risk
35/60 High Risk
0/40 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
ℹ️ Info: FSF or OSI recognized license: MIT License: LICENSE:0
10/10
Maintained
High Risk

17 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10

Determines if the project is "actively maintained".

10/10
Vulnerabilities
High Risk

0 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

5/10
Branch-Protection
High Risk

branch protection is not maximal on development and all release branches

Determines if the default and release branches are protected with GitHub's branch protection settings.

Show details
ℹ️ Info: 'allow deletion' disabled on branch 'main'
ℹ️ Info: 'force pushes' disabled on branch 'main'
⚠️ Warn: 'branch protection settings apply to administrators' is disabled on branch 'main'
⚠️ Warn: 'stale review dismissal' is disabled on branch 'main'
⚠️ Warn: required approving review count is 1 on branch 'main'
ℹ️ Info: codeowner review is required on branch 'main'
⚠️ Warn: 'last push approval' is disabled on branch 'main'
⚠️ Warn: no status checks found to merge onto branch 'main'
ℹ️ Info: PRs are required in order to make changes on branch 'main'
0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Code-Review
High Risk

Found 0/11 approved changesets -- score normalized to 0

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/commit-check.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/commit-check/commit-check-action/commit-check.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/main.yaml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/commit-check/commit-check-action/main.yaml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:10: update your workflow using https://app.stepsecurity.io/secureworkflow/commit-check/commit-check-action/pre-commit.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/release-drafter.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/commit-check/commit-check-action/release-drafter.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/used-by.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/commit-check/commit-check-action/used-by.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/used-by.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/commit-check/commit-check-action/used-by.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/used-by.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/commit-check/commit-check-action/used-by.yml/main?enable=pin
ℹ️ Info: 0 out of 3 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 0 out of 4 third-party GitHubAction dependencies pinned
0/10
SAST
Medium Risk

SAST tool is not run on all commits -- score normalized to 0

Determines if the project uses static code analysis.

Show details
⚠️ Warn: 0 commits out of 30 are checked with a SAST tool
0/10
Security-Policy
Medium Risk

security policy file not detected

Determines if the project has published a security policy.

Show details
⚠️ Warn: no security policy file detected
⚠️ Warn: no security file to analyze
⚠️ Warn: no security file to analyze
⚠️ Warn: no security file to analyze
0/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/commit-check.yml:12
⚠️ Warn: no topLevel permission defined: .github/workflows/commit-check.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/main.yaml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/pre-commit.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/release-drafter.yml:1
⚠️ Warn: topLevel 'contents' permission set to 'write': .github/workflows/used-by.yml:11
ℹ️ Info: no jobLevel write permissions found
N/A
Packaging
Not Applicable

packaging workflow not detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
⚠️ Warn: no GitHub/GitLab publishing workflow detected.
N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.