Skip to content

Add security-insights.yml for OSSF Security Insights v2.0.0#11259

Open
vinayada1 wants to merge 2 commits intomainfrom
add-security-insights
Open

Add security-insights.yml for OSSF Security Insights v2.0.0#11259
vinayada1 wants to merge 2 commits intomainfrom
add-security-insights

Conversation

@vinayada1
Copy link
Contributor

@vinayada1 vinayada1 commented Feb 17, 2026

Description

Add a security insights file describing all the radius repositories.

Type of change

  • This pull request fixes a bug in Radius and has an approved issue (issue link required).
  • This pull request adds or changes features of Radius and has an approved issue (issue link required).
  • This pull request is a minor refactor, code cleanup, test improvement, or other maintenance task and doesn't change the functionality of Radius (issue link optional).

Fixes: #11258

Contributor checklist

Please verify that the PR meets the following requirements, where applicable:

  • An overview of proposed schema changes is included in a linked GitHub issue.
    • Yes
    • Not applicable
  • A design document PR is created in the design-notes repository, if new APIs are being introduced.
    • Yes
    • Not applicable
  • The design document has been reviewed and approved by Radius maintainers/approvers.
    • Yes
    • Not applicable
  • A PR for the samples repository is created, if existing samples are affected by the changes in this PR.
    • Yes
    • Not applicable
  • A PR for the documentation repository is created, if the changes in this PR affect the documentation or any user facing updates are made.
    • Yes
    • Not applicable
  • A PR for the recipes repository is created, if existing recipes are affected by the changes in this PR.
    • Yes
    • Not applicable

@vinayada1 vinayada1 requested a review from a team as a code owner February 17, 2026 21:44
Copilot AI review requested due to automatic review settings February 17, 2026 21:44
@vinayada1 vinayada1 requested a review from a team as a code owner February 17, 2026 21:44
@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 17, 2026 21:44 — with GitHub Actions Waiting
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds an OpenSSF Security Insights v2.0.0 metadata file under .github/ to enable Security Insights tooling to discover project/repository security posture and related links.

Changes:

  • Add .github/security-insights.yml describing project metadata, vulnerability reporting info, and security tooling integrations.

@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 17, 2026 21:49 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 17, 2026 21:49 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 17, 2026 21:49 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 17, 2026 21:49 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 17, 2026 21:50 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 17, 2026 21:50 — with GitHub Actions Waiting
@github-actions
Copy link

github-actions bot commented Feb 17, 2026

Unit Tests

    2 files  ±0    415 suites  ±0   6m 44s ⏱️ -10s
4 881 tests ±0  4 879 ✅ ±0  2 💤 ±0  0 ❌ ±0 
5 783 runs  ±0  5 781 ✅ ±0  2 💤 ±0  0 ❌ ±0 

Results for commit 2b6cb02. ± Comparison against base commit 0a26e31.

♻️ This comment has been updated with latest results.

@codecov
Copy link

codecov bot commented Feb 17, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 51.24%. Comparing base (0a26e31) to head (2b6cb02).
⚠️ Report is 2 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main   #11259      +/-   ##
==========================================
+ Coverage   51.22%   51.24%   +0.01%     
==========================================
  Files         699      699              
  Lines       44062    44062              
==========================================
+ Hits        22572    22578       +6     
+ Misses      19330    19327       -3     
+ Partials     2160     2157       -3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 20, 2026 18:11 — with GitHub Actions Waiting
@vinayada1 vinayada1 force-pushed the add-security-insights branch from 73e9f13 to 7c59ea7 Compare February 20, 2026 19:59
@vinayada1 vinayada1 temporarily deployed to external-contributor-approval February 20, 2026 19:59 — with GitHub Actions Inactive
email: ''
social: https://github.com/kachawla
primary: false
- name: Brooke Hamilton
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

suggestion: I think I will put Nicole instead.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I got this from the maintainers list. Nicole's name is not there. @willtsai - What's the correct contact to mention here?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think these are correct - perhaps you can add Nicole as the 5th entry?

Copy link
Contributor Author

@vinayada1 vinayada1 Feb 23, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nicole's name is not in any list like maintainers or approvers....so best to leave out? I instead added Radius Core Team contact as the primary.

email: ''
social: https://github.com/kachawla
primary: false
- name: Brooke Hamilton
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

suggestion: I think I will put Nicole instead.

@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 20, 2026 21:10 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 20, 2026 21:11 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval February 23, 2026 18:02 — with GitHub Actions Waiting
@vinayada1 vinayada1 temporarily deployed to external-contributor-approval February 24, 2026 18:59 — with GitHub Actions Inactive
@vinayada1 vinayada1 temporarily deployed to external-contributor-approval February 27, 2026 17:33 — with GitHub Actions Inactive
@DariuszPorowski DariuszPorowski requested a review from a team as a code owner March 4, 2026 06:06
@vinayada1 vinayada1 temporarily deployed to external-contributor-approval March 18, 2026 16:50 — with GitHub Actions Inactive
@DariuszPorowski DariuszPorowski requested a review from Copilot March 18, 2026 20:02
@DariuszPorowski DariuszPorowski self-requested a review March 18, 2026 20:02
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 2 out of 2 changed files in this pull request and generated 6 comments.


You can also share your feedback on Copilot code review. Take the survey.

Comment on lines +1 to +5
header:
schema-version: 2.0.0
last-updated: '2026-02-20'
last-reviewed: '2026-02-20'
url: https://github.com/radius-project/radius
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@copilot apply changes based on this feedback

@vinayada1 vinayada1 requested a deployment to external-contributor-approval March 18, 2026 20:27 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval March 18, 2026 20:28 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval March 18, 2026 20:28 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval March 18, 2026 20:29 — with GitHub Actions Waiting
@vinayada1 vinayada1 requested a deployment to external-contributor-approval March 18, 2026 20:29 — with GitHub Actions Waiting
Copy link
Contributor

Copilot AI commented Mar 18, 2026

@vinayada1 I've opened a new pull request, #11444, to work on those changes. Once the pull request is ready, I'll request review from you.

Co-authored-by: Dariusz Porowski <[email protected]>
Signed-off-by: vinayada1 <[email protected]>
@vinayada1 vinayada1 force-pushed the add-security-insights branch from 690bd2c to 4e8e6fe Compare March 18, 2026 20:45
@vinayada1 vinayada1 temporarily deployed to external-contributor-approval March 18, 2026 20:45 — with GitHub Actions Inactive
@radius-functional-tests
Copy link

radius-functional-tests bot commented Mar 18, 2026

Radius functional test overview

🔍 Go to test action run

Click here to see the test run details
Name Value
Repository radius-project/radius
Commit ref 4e8e6fe
Unique ID func4ac9218f6b
Image tag pr-func4ac9218f6b
  • gotestsum 1.13.0
  • KinD: v0.29.0
  • Dapr: 1.14.4
  • Azure KeyVault CSI driver: 1.4.2
  • Azure Workload identity webhook: 1.3.0
  • Bicep recipe location ghcr.io/radius-project/dev/test/testrecipes/test-bicep-recipes/<name>:pr-func4ac9218f6b
  • Terraform recipe location http://tf-module-server.radius-test-tf-module-server.svc.cluster.local/<name>.zip (in cluster)
  • applications-rp test image location: ghcr.io/radius-project/dev/applications-rp:pr-func4ac9218f6b
  • dynamic-rp test image location: ghcr.io/radius-project/dev/dynamic-rp:pr-func4ac9218f6b
  • controller test image location: ghcr.io/radius-project/dev/controller:pr-func4ac9218f6b
  • ucp test image location: ghcr.io/radius-project/dev/ucpd:pr-func4ac9218f6b
  • deployment-engine test image location: ghcr.io/radius-project/deployment-engine:latest

Test Status

⌛ Building Radius and pushing container images for functional tests...
✅ Container images build succeeded
⌛ Publishing Bicep Recipes for functional tests...
✅ Recipe publishing succeeded
⌛ Starting corerp-cloud functional tests...
⌛ Starting ucp-cloud functional tests...
✅ ucp-cloud functional tests succeeded
✅ corerp-cloud functional tests succeeded

Copy link
Member

@DariuszPorowski DariuszPorowski left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Make sure you sign-off you commits because DCO check will always fail.

bug-fixes-only: true
accepts-change-request: true
accepts-automated-change-request: true
no-third-party-packages: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

issue: false - we have 3rd party deps

release:
changelog: https://github.com/radius-project/radius/releases
automated-pipeline: false
attestations:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

issue: we do not attest releases

…#11449)

# Description

Validated with CUE and cleaned up based on the results.

## Type of change

- This pull request is a minor refactor, code cleanup, test improvement,
or other maintenance task and doesn't change the functionality of Radius
(issue link optional).

## Contributor checklist
Please verify that the PR meets the following requirements, where
applicable:

<!--
This checklist uses "TaskRadio" comments to make certain options
mutually exclusive.
See:
https://github.com/mheap/require-checklist-action?tab=readme-ov-file#radio-groups
For details on how this works and why it's required.
-->

- An overview of proposed schema changes is included in a linked GitHub
issue.
    - [ ] Yes <!-- TaskRadio schema -->
    - [x] Not applicable <!-- TaskRadio schema -->
- A design document PR is created in the [design-notes
repository](https://github.com/radius-project/design-notes/), if new
APIs are being introduced.
    - [ ] Yes <!-- TaskRadio design-pr -->
    - [x] Not applicable <!-- TaskRadio design-pr -->
- The design document has been reviewed and approved by Radius
maintainers/approvers.
    - [ ] Yes <!-- TaskRadio design-review -->
    - [x] Not applicable <!-- TaskRadio design-review -->
- A PR for the [samples
repository](https://github.com/radius-project/samples) is created, if
existing samples are affected by the changes in this PR.
    - [ ] Yes <!-- TaskRadio samples-pr -->
    - [x] Not applicable <!-- TaskRadio samples-pr -->
- A PR for the [documentation
repository](https://github.com/radius-project/docs) is created, if the
changes in this PR affect the documentation or any user facing updates
are made.
    - [ ] Yes <!-- TaskRadio docs-pr -->
    - [x] Not applicable <!-- TaskRadio docs-pr -->
- A PR for the [recipes
repository](https://github.com/radius-project/recipes) is created, if
existing recipes are affected by the changes in this PR.
    - [ ] Yes <!-- TaskRadio recipes-pr -->
    - [x] Not applicable <!-- TaskRadio recipes-pr -->

Signed-off-by: Dariusz Porowski <[email protected]>
@DariuszPorowski DariuszPorowski requested a deployment to external-contributor-approval March 19, 2026 03:31 — with GitHub Actions Waiting
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add a security insights file for OpenSSF tooling

5 participants