An open API service providing repository metadata for many open source software ecosystems.

OpenSSF Scorecard report

6.5

Overall Score

10/10 Critical Risk
30/50 High Risk
30/50 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Code-Review
High Risk

all changesets reviewed

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
ℹ️ Info: FSF or OSI recognized license: MIT License: LICENSE:0
10/10
Packaging
Medium Risk

packaging workflow detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
ℹ️ Info: Project packages its releases by way of GitHub Actions.: .github/workflows/release.yml:19
10/10
SAST
Medium Risk

SAST tool detected

Determines if the project uses static code analysis.

Show details
ℹ️ Info: SAST configuration detected: CodeQL
ℹ️ Info: SAST configuration detected: Snyk
ℹ️ Info: all commits (30) are checked with a SAST tool
10/10
Security-Policy
Medium Risk

security policy file detected

Determines if the project has published a security policy.

Show details
ℹ️ Info: security policy file detected: SECURITY.md:1
ℹ️ Info: Found linked content: SECURITY.md:1
ℹ️ Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
ℹ️ Info: Found text in security policy: SECURITY.md:1
10/10
Vulnerabilities
High Risk

0 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Maintained
High Risk

0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0

Determines if the project is "actively maintained".

0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/check-branch.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/check-branch.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:37: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:55: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:68: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/codeql-analysis.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/issues-jira.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/issues-jira.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/issues-jira.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/issues-jira.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/policy-scan.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/policy-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/policy-scan.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/policy-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/release.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:26: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/release.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/sca-scan.yml:9: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/sca-scan.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/sca-scan.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/sca-scan.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/secrets-scan.yml:9: update your workflow using https://app.stepsecurity.io/secureworkflow/contentstack/contentstack-utils-python/secrets-scan.yml/master?enable=pin
⚠️ Warn: pipCommand not pinned by hash: .github/workflows/release.yml:31
⚠️ Warn: pipCommand not pinned by hash: .github/workflows/release.yml:32
⚠️ Warn: downloadThenRun not pinned by hash: .github/workflows/secrets-scan.yml:29
ℹ️ Info: 0 out of 10 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 1 out of 5 third-party GitHubAction dependencies pinned
ℹ️ Info: 0 out of 2 pipCommand dependencies pinned
ℹ️ Info: 0 out of 1 downloadThenRun dependencies pinned
0/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:24
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:25
⚠️ Warn: no topLevel permission defined: .github/workflows/check-branch.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/issues-jira.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/policy-scan.yml:1
ℹ️ Info: topLevel 'contents' permission set to 'read': .github/workflows/release.yml:16
⚠️ Warn: no topLevel permission defined: .github/workflows/sca-scan.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/secrets-scan.yml:1
ℹ️ Info: no jobLevel write permissions found
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.

Links
Repository Details
  • Stars 0
  • Forks 0
  • Open issues 0
  • License mit
  • Language Python
  • Size 230 KB
  • Created at over 5 years ago
  • Updated at 10 days ago
  • Pushed at 10 days ago
  • Last synced at 10 days ago
  • Dependencies parsed at Pending
Commit Stats