An open API service providing repository metadata for many open source software ecosystems.

GitHub / gitpython-developers / GitPython

GitPython is a python library used to interact with Git repositories.

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/gitpython-developers%2FGitPython
PURL: pkg:github/gitpython-developers/GitPython

Stars: 4,933
Forks: 954
Open issues: 173

License: bsd-3-clause
Language: Python
Size: 11 MB
Dependencies parsed at: Pending

Created at: over 14 years ago
Updated at: about 13 hours ago
Pushed at: about 13 hours ago
Last synced at: about 11 hours ago

Commit Stats

Commits: 3608
Authors: 322
Mean commits per author: 11.2
Development Distribution Score: 0.686
More commit stats: https://commits.ecosyste.ms/hosts/GitHub/repositories/gitpython-developers/GitPython

Topics: git-plumbing, git-porcelain, python-library

Funding Links https://github.com/sponsors/byron

OpenSSF Scorecard report

8.3

Overall Score

10/10 Critical Risk
44/50 High Risk
30/40 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
Fuzzing
Medium Risk

project is fuzzed

Determines if the project uses fuzzing.

Show details
ℹ️ Info: OSSFuzz integration found
ℹ️ Info: PythonAtherisFuzzer integration found: fuzzing/fuzz-targets/fuzz_blob.py:1
ℹ️ Info: PythonAtherisFuzzer integration found: fuzzing/fuzz-targets/fuzz_config.py:20
ℹ️ Info: PythonAtherisFuzzer integration found: fuzzing/fuzz-targets/fuzz_diff.py:7
ℹ️ Info: PythonAtherisFuzzer integration found: fuzzing/fuzz-targets/fuzz_repo.py:1
ℹ️ Info: PythonAtherisFuzzer integration found: fuzzing/fuzz-targets/fuzz_submodule.py:1
ℹ️ Info: PythonAtherisFuzzer integration found: fuzzing/fuzz-targets/utils.py:1
10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
ℹ️ Info: FSF or OSI recognized license: BSD 3-Clause "New" or "Revised" License: LICENSE:0
10/10
Maintained
High Risk

30 commit(s) and 12 issue activity found in the last 90 days -- score normalized to 10

Determines if the project is "actively maintained".

10/10
SAST
Medium Risk

SAST tool is run on all commits

Determines if the project uses static code analysis.

Show details
ℹ️ Info: SAST configuration detected: CodeQL
ℹ️ Info: all commits (30) are checked with a SAST tool
10/10
Security-Policy
Medium Risk

security policy file detected

Determines if the project has published a security policy.

Show details
ℹ️ Info: security policy file detected: SECURITY.md:1
ℹ️ Info: Found linked content: SECURITY.md:1
ℹ️ Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
ℹ️ Info: Found text in security policy: SECURITY.md:1
10/10
Vulnerabilities
High Risk

0 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

9/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: topLevel 'contents' permission set to 'read': .github/workflows/alpine-test.yml:6
⚠️ Warn: no topLevel permission defined: .github/workflows/codeql.yml:1
ℹ️ Info: topLevel 'contents' permission set to 'read': .github/workflows/cygwin-test.yml:6
ℹ️ Info: topLevel 'contents' permission set to 'read': .github/workflows/lint.yml:6
ℹ️ Info: topLevel 'contents' permission set to 'read': .github/workflows/pythonpackage.yml:9
ℹ️ Info: no jobLevel write permissions found
5/10
Code-Review
High Risk

Found 4/8 approved changesets -- score normalized to 5

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
ℹ️ Info: Possibly incomplete results: error parsing shell code: "foo(" must be followed by ): test/fixtures/polyglot:0
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/alpine-test.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/alpine-test.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql.yml:50: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/codeql.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql.yml:60: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/codeql.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql.yml:88: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/codeql.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/cygwin-test.yml:37: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/cygwin-test.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/cygwin-test.yml:42: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/cygwin-test.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/lint.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/lint.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/lint.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/lint.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/lint.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/lint.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pythonpackage.yml:42: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/pythonpackage.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pythonpackage.yml:47: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/pythonpackage.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pythonpackage.yml:54: update your workflow using https://app.stepsecurity.io/secureworkflow/gitpython-developers/GitPython/pythonpackage.yml/main?enable=pin
⚠️ Warn: containerImage not pinned by hash: fuzzing/local-dev-helpers/Dockerfile:4: pin your Docker image by updating python:3.8-bookworm to python:3.8-bookworm@sha256:d411270700143fa2683cc8264d9fa5d3279fd3b6afff62ae81ea2f9d070e390c
⚠️ Warn: pipCommand not pinned by hash: fuzzing/local-dev-helpers/Dockerfile:13-20
⚠️ Warn: pipCommand not pinned by hash: fuzzing/local-dev-helpers/Dockerfile:13-20
⚠️ Warn: pipCommand not pinned by hash: fuzzing/local-dev-helpers/Dockerfile:13-20
⚠️ Warn: pipCommand not pinned by hash: build-release.sh:23
⚠️ Warn: pipCommand not pinned by hash: fuzzing/oss-fuzz-scripts/build.sh:8
⚠️ Warn: pipCommand not pinned by hash: fuzzing/oss-fuzz-scripts/container-environment-bootstrap.sh:106
⚠️ Warn: pipCommand not pinned by hash: fuzzing/oss-fuzz-scripts/container-environment-bootstrap.sh:108
ℹ️ Info: 0 out of 9 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 0 out of 3 third-party GitHubAction dependencies pinned
ℹ️ Info: 0 out of 1 containerImage dependencies pinned
ℹ️ Info: 0 out of 7 pipCommand dependencies pinned
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Packaging
Not Applicable

packaging workflow not detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
⚠️ Warn: no GitHub/GitLab publishing workflow detected.
N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.