Skip to content

fix: expand DevSecOps incomplete categories#461

Merged
mattaereal merged 1 commit intosecurity-alliance:developfrom
frameworks-volunteer:fix/issue-439-devsecops-incomplete
Apr 21, 2026
Merged

fix: expand DevSecOps incomplete categories#461
mattaereal merged 1 commit intosecurity-alliance:developfrom
frameworks-volunteer:fix/issue-439-devsecops-incomplete

Conversation

@frameworks-volunteer
Copy link
Copy Markdown
Collaborator

Model: `minimax/MiniMax-M2.7` Reasoning: `high` Provider: `openrouter`

Addresses #439 by expanding content in four DevSecOps categories that were marked incomplete or scarce:

  • code-signing.mdx: Added GPG key generation, subkeys, YubiKey setup, passphrase management, key backup/recovery
  • continuous-integration-continuous-deployment.mdx: Added SLSA provenance, SBOM generation, OIDC federation for cloud access
  • repository-hardening.mdx: Added CODEOWNERS patterns, GitHub Advanced Security (CodeQL, secret scanning, dependency review), security policy template
  • security-testing.mdx: Added severity thresholds table, Semgrep custom rules, false positive management, coverage and mutation testing

Note: This PR was generated by the reactive agent. The model went silent after the git commit was signed, so the push and PR creation were completed manually.

Closes #439

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Apr 21, 2026

built with Refined Cloudflare Pages Action

⚡ Cloudflare Pages Deployment

Name Status Preview Last Commit
frameworks ✅ Ready (View Log) Visit Preview 5b2c829

…#439)

- code-signing.mdx: Add GPG key generation, subkeys, YubiKey setup, passphrase management, key backup/recovery
- continuous-integration-continuous-deployment.mdx: Add SLSA provenance, SBOM generation, OIDC federation for cloud access
- repository-hardening.mdx: Add CODEOWNERS patterns, GitHub Advanced Security (CodeQL, secret scanning, dependency review), security policy template
- security-testing.mdx: Add severity thresholds table, Semgrep custom rules, false positive management, coverage and mutation testing
Copy link
Copy Markdown
Collaborator Author

@frameworks-volunteer frameworks-volunteer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Model: z-ai/glm-5.1 Reasoning: high Provider: openrouter

Security Review: PASS

No hardcoded secrets, injection vectors, or unsafe deserialization found. All code snippets are instructional (bash, yaml, json) -- no executable MDX/JSX vulnerabilities. External links point to legitimate sources (GitHub Docs, NIST, SLSA, OWASP, OpenSSF).

QA Review: PASS with minor notes

Changes match PR description and issue #439. All four DevSecOps categories expanded from sparse bullet lists to detailed, well-structured guidance. Frontmatter format consistent with existing pages. Internal links all resolve. Section numbering uses consistent letter-suffix convention.

Minor observations (non-blocking):

  1. CISA link mismatch (ci-cd.mdx L339): Link text says "Securing the Software Supply Chain for Developers" but URL is cisa.gov/sbom (the SBOM page). Consider updating to cisa.gov/sbom with text "CISA: Software Bill of Materials" or using the correct supply-chain guide URL.

  2. keys.mailvelope.com (code-signing.mdx L196): This keyserver was discontinued. Consider removing it or replacing with keyserver.ubuntu.com.

  3. Expired date in example (security-testing.mdx L191): The nosemgrep suppression example shows Expiry: 2025-06-01, which is now past. Consider updating to a future date (e.g., 2027-01-01) so the example remains illustrative.

  4. Broad Semgrep rule (security-testing.mdx L165): The console.log(...$SENSITIVE) pattern matches any console.log call, not just ones with sensitive data. Consider adding a note that this is a simplified example, or tightening the pattern.

  5. Title convention: The PR updates code-signing.mdx and ci-cd.mdx from "SEAL" to "Security Alliance" in titles. This is consistent with newer pages (overview, data-security-checklist). The older isolation/ pages still use "SEAL" but that's pre-existing and out of scope.

All observations are minor. The content quality is high -- comprehensive, well-organized, with good Web3-specific guidance.

@mattaereal mattaereal merged commit c0b22ea into security-alliance:develop Apr 21, 2026
3 checks passed
mattaereal pushed a commit that referenced this pull request Apr 21, 2026
- Update contributors frontmatter: mattaereal as author, scode2277 as reviewer
- Replace discontinued keys.mailvelope.com with keyserver.ubuntu.com
- Fix CISA link text to match URL (Software Bill of Materials)
- Update expired nosemgrep example date to 2027-06-01
- Add note about simplified Semgrep rule example
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Improve DevSecOps remaining incomplete/scarce categories

2 participants