An open API service providing repository metadata for many open source software ecosystems.

GitHub / pester / Pester

Pester is the ubiquitous test and mock framework for PowerShell.

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pester%2FPester
PURL: pkg:github/pester/Pester

Stars: 3,207
Forks: 478
Open issues: 160

License: other
Language: PowerShell
Size: 21 MB
Dependencies parsed at: Pending

Created at: over 14 years ago
Updated at: 23 days ago
Pushed at: about 1 month ago
Last synced at: 20 days ago

Commit Stats

Commits: 1705
Authors: 163
Mean commits per author: 10.46
Development Distribution Score: 0.656
More commit stats: https://commits.ecosyste.ms/hosts/GitHub/repositories/pester/Pester

Topics: assertions, bdd, bdd-framework, mock, mocking, pester-tests, powershell, powershell-tests, tdd, tdd-framework, testing

Funding Links https://github.com/sponsors/nohwnd, https://github.com/sponsors/fflaten, https://opencollective.com/pester

OpenSSF Scorecard report

6.3

Overall Score

10/10 Critical Risk
32/50 High Risk
19/40 Medium Risk
9/20 Low Risk
Generated on August 04, 2025 | Scorecard vv5.2.1-28-gc1d103a9
Security Checks
10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
Security-Policy
Medium Risk

security policy file detected

Determines if the project has published a security policy.

Show details
ℹ️ Info: security policy file detected: SECURITY.md:1
ℹ️ Info: Found linked content: SECURITY.md:1
ℹ️ Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
ℹ️ Info: Found text in security policy: SECURITY.md:1
10/10
Vulnerabilities
High Risk

0 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

9/10
Binary-Artifacts
High Risk

binaries present in source code

Determines if the project has generated executable (binary) artifacts in the source repository.

Show details
⚠️ Warn: binary detected: publish/vendor/tools/nuget.exe:1
9/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
⚠️ Warn: project license file does not contain an FSF or OSI license.
9/10
SAST
Medium Risk

SAST tool is not run on all commits -- score normalized to 9

Determines if the project uses static code analysis.

Show details
⚠️ Warn: 22 commits out of 24 are checked with a SAST tool
7/10
Maintained
High Risk

0 commit(s) and 9 issue activity found in the last 90 days -- score normalized to 7

Determines if the project is "actively maintained".

6/10
Code-Review
High Risk

Found 18/30 approved changesets -- score normalized to 6

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/backport.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/pester/Pester/backport.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/code-analysis.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/pester/Pester/code-analysis.yml/main?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/code-analysis.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/pester/Pester/code-analysis.yml/main?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/code-analysis.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/pester/Pester/code-analysis.yml/main?enable=pin
ℹ️ Info: 0 out of 2 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 0 out of 2 third-party GitHubAction dependencies pinned
0/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: jobLevel 'actions' permission set to 'read': .github/workflows/code-analysis.yml:15
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/code-analysis.yml:16
⚠️ Warn: topLevel 'contents' permission set to 'write': .github/workflows/backport.yml:10
⚠️ Warn: topLevel 'actions' permission set to 'write': .github/workflows/backport.yml:13
⚠️ Warn: no topLevel permission defined: .github/workflows/code-analysis.yml:1
ℹ️ Info: no jobLevel write permissions found
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Packaging
Not Applicable

packaging workflow not detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
⚠️ Warn: no GitHub/GitLab publishing workflow detected.
N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.