GitHub / commit-check / commit-check
Commit Check enforces commit metadata standards, including commit message, branch naming, committer name/email and more.
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/commit-check%2Fcommit-check
PURL: pkg:github/commit-check/commit-check
Stars: 30
Forks: 7
Open issues: 6
License: mit
Language: Python
Size: 41.6 MB
Dependencies parsed at: Pending
Created at: over 3 years ago
Updated at: 4 days ago
Pushed at: 4 days ago
Last synced at: 4 days ago
Topics: branch-naming, commit-check, conventional-branch, conventional-commits, naming-conventions, standard-naming, yet-another-commit-checker
Funding Links https://github.com/sponsors/shenxianpeng
OpenSSF Scorecard report
5.6
Overall Score
Security Checks
no binaries found in the repo
Determines if the project has generated executable (binary) artifacts in the source repository.
no dangerous workflow patterns detected
Determines if the project's GitHub Action workflows avoid dangerous patterns.
update tool detected
Determines if the project uses a dependency update tool.
Show details
license file detected
Determines if the project has defined a license.
Show details
publishing workflow detected
Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.
Show details
SAST tool is run on all commits
Determines if the project uses static code analysis.
Show details
no vulnerabilities detected
Determines if the project has open, known unfixed vulnerabilities.
11 commit(s) out of 30 and 0 issue activity out of 27 found in the last 90 days -- score normalized to 9
Determines if the project is "actively maintained".
16 out of 28 merged PRs checked by a CI test -- score normalized to 5
Determines if the project runs tests before pull requests are merged.
dependency not pinned by hash detected -- score normalized to 2
Determines if the project has declared and pinned the dependencies of its build process.
Show details
found 5 unreviewed changesets out of 6 -- score normalized to 1
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
branch protection not enabled on development/release branches
Determines if the default and release branches are protected with GitHub's branch protection settings.
Show details
no effort to earn an OpenSSF best practices badge detected
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
0 different organizations found -- score normalized to 0
Determines if the project has a set of contributors from multiple organizations (e.g., companies).
Show details
project is not fuzzed
Determines if the project uses fuzzing.
Show details
security policy file not detected
Determines if the project has published a security policy.
Show details
detected GitHub workflow tokens with excessive permissions
Determines if the project's workflows follow the principle of least privilege.