An open API service providing repository metadata for many open source software ecosystems.

Java Utils library Allows you to fetch embedded entries/assets (placed inside the “Rich Text Editor” (RTE) field) and display them on your frontend application. To learn how to embed entries/assets in the RTE field

OpenSSF Scorecard report

5.6

Overall Score

10/10 Critical Risk
21/50 High Risk
30/50 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
ℹ️ Info: FSF or OSI recognized license: MIT License: LICENSE:0
10/10
Packaging
Medium Risk

packaging workflow detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
ℹ️ Info: Project packages its releases by way of GitHub Actions.: .github/workflows/maven-publish.yml:29
10/10
SAST
Medium Risk

SAST tool detected

Determines if the project uses static code analysis.

Show details
ℹ️ Info: SAST configuration detected: CodeQL
ℹ️ Info: SAST configuration detected: Snyk
ℹ️ Info: all commits (18) are checked with a SAST tool
10/10
Security-Policy
Medium Risk

security policy file detected

Determines if the project has published a security policy.

Show details
ℹ️ Info: security policy file detected: SECURITY.md:1
ℹ️ Info: Found linked content: SECURITY.md:1
ℹ️ Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
ℹ️ Info: Found text in security policy: SECURITY.md:1
7/10
Vulnerabilities
High Risk

3 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

Show details
⚠️ Warn: Project is vulnerable to: GHSA-269g-pwp5-87pp
⚠️ Warn: Project is vulnerable to: GHSA-j288-q9x7-2f5v
⚠️ Warn: Project is vulnerable to: GHSA-6r3c-xf4w-jxjm
4/10
Code-Review
High Risk

Found 9/21 approved changesets -- score normalized to 4

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Maintained
High Risk

0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0

Determines if the project is "actively maintained".

0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/check-branch.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/check-branch.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:37: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:55: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:68: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/codeql-analysis.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/issues-jira.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/issues-jira.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/issues-jira.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/issues-jira.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/maven-publish.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/maven-publish.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/maven-publish.yml:14: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/maven-publish.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/maven-publish.yml:32: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/maven-publish.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/maven-publish.yml:34: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/maven-publish.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/policy-scan.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/policy-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/policy-scan.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/policy-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/sca-scan.yml:9: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/sca-scan.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/sca-scan.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/sca-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/secrets-scan.yml:9: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-java/secrets-scan.yml/master?enable=pin
⚠️ Warn: downloadThenRun not pinned by hash: .github/workflows/secrets-scan.yml:29
ℹ️ Info: 0 out of 12 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 0 out of 4 third-party GitHubAction dependencies pinned
ℹ️ Info: 0 out of 1 downloadThenRun dependencies pinned
0/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:24
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:25
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/maven-publish.yml:9
⚠️ Warn: no topLevel permission defined: .github/workflows/check-branch.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/issues-jira.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/maven-publish.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/policy-scan.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/sca-scan.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/secrets-scan.yml:1
ℹ️ Info: no jobLevel write permissions found
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.

Links
Repository Details
  • Stars 0
  • Forks 0
  • Open issues 8
  • License mit
  • Language Java
  • Size 442 KB
  • Created at over 5 years ago
  • Updated at 5 months ago
  • Pushed at 4 months ago
  • Last synced at 4 months ago
  • Dependencies parsed at Pending
Commit Stats