An open API service providing repository metadata for many open source software ecosystems.

GitHub / contentstack / contentstack-python

Python SDK for Contentstack's Content Delivery API

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/contentstack%2Fcontentstack-python
PURL: pkg:github/contentstack/contentstack-python

Stars: 4
Forks: 3
Open issues: 2

License: mit
Language: Python
Size: 6.55 MB
Dependencies parsed at: Pending

Created at: over 6 years ago
Updated at: 2 months ago
Pushed at: 9 days ago
Last synced at: 9 days ago

Commit Stats

Commits: 178
Authors: 6
Mean commits per author: 29.67
Development Distribution Score: 0.511
More commit stats: https://commits.ecosyste.ms/hosts/GitHub/repositories/contentstack/contentstack-python

OpenSSF Scorecard report

7.1

Overall Score

10/10 Critical Risk
37/50 High Risk
30/50 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Code-Review
High Risk

all changesets reviewed

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
ℹ️ Info: FSF or OSI recognized license: MIT License: LICENSE:0
10/10
Maintained
High Risk

23 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10

Determines if the project is "actively maintained".

10/10
Packaging
Medium Risk

packaging workflow detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
ℹ️ Info: Project packages its releases by way of GitHub Actions.: .github/workflows/python-publish.yml:19
10/10
SAST
Medium Risk

SAST tool detected

Determines if the project uses static code analysis.

Show details
ℹ️ Info: SAST configuration detected: CodeQL
ℹ️ Info: SAST configuration detected: Snyk
ℹ️ Info: all commits (30) are checked with a SAST tool
10/10
Security-Policy
Medium Risk

security policy file detected

Determines if the project has published a security policy.

Show details
ℹ️ Info: security policy file detected: SECURITY.md:1
ℹ️ Info: Found linked content: SECURITY.md:1
ℹ️ Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
ℹ️ Info: Found text in security policy: SECURITY.md:1
7/10
Vulnerabilities
High Risk

3 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

Show details
⚠️ Warn: Project is vulnerable to: GHSA-cpwx-vrp4-4pq7
⚠️ Warn: Project is vulnerable to: GHSA-gmj6-6f8f-6699
⚠️ Warn: Project is vulnerable to: GHSA-q2x7-8rv6-6q7h
0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/check-branch.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/check-branch.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:37: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:55: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:68: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/codeql-analysis.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/issues-jira.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/issues-jira.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/issues-jira.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/issues-jira.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/policy-scan.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/policy-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/policy-scan.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/policy-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/python-publish.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/python-publish.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/python-publish.yml:26: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/python-publish.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/sca-scan.yml:9: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/sca-scan.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/sca-scan.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/sca-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/secrets-scan.yml:9: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-python/secrets-scan.yml/master?enable=pin
⚠️ Warn: pipCommand not pinned by hash: .github/workflows/python-publish.yml:31
⚠️ Warn: pipCommand not pinned by hash: .github/workflows/python-publish.yml:32
⚠️ Warn: downloadThenRun not pinned by hash: .github/workflows/secrets-scan.yml:29
ℹ️ Info: 0 out of 10 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 1 out of 5 third-party GitHubAction dependencies pinned
ℹ️ Info: 0 out of 2 pipCommand dependencies pinned
ℹ️ Info: 0 out of 1 downloadThenRun dependencies pinned
0/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:24
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:25
⚠️ Warn: no topLevel permission defined: .github/workflows/check-branch.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/issues-jira.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/policy-scan.yml:1
ℹ️ Info: topLevel 'contents' permission set to 'read': .github/workflows/python-publish.yml:16
⚠️ Warn: no topLevel permission defined: .github/workflows/sca-scan.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/secrets-scan.yml:1
ℹ️ Info: no jobLevel write permissions found
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.