Get the FREE Ultimate OpenClaw Setup Guide →

enterprise-readiness

npx machina-cli add skill eugenepyvovarov/mcpbundler-agent-skills-marketplace/enterprise-readiness-skill --openclaw
Files (1)
SKILL.md
24.9 KB

Enterprise Readiness Assessment

When to Use

  • Evaluating projects for production/enterprise readiness
  • Implementing supply chain security (SLSA, signing, SBOMs)
  • Hardening CI/CD pipelines
  • Establishing quality gates
  • Pursuing OpenSSF Best Practices Badge (Passing/Silver/Gold)
  • Reviewing code or PRs for quality
  • Writing ADRs, changelogs, or migration guides
  • Configuring Git hooks or CI pipelines

MANDATORY Requirements

CRITICAL: The following are NOT optional. Every project MUST have ALL of these. Do not skip any.

README Badges (MANDATORY)

Every project README.md MUST display these badges at the top, in this order:

<!-- Row 1: CI/Quality -->
[![CI](https://github.com/ORG/REPO/actions/workflows/ci.yml/badge.svg)](https://github.com/ORG/REPO/actions/workflows/ci.yml)
[![codecov](https://codecov.io/gh/ORG/REPO/graph/badge.svg)](https://codecov.io/gh/ORG/REPO)

<!-- Row 2: Security (MANDATORY) -->
[![OpenSSF Scorecard](https://api.securityscorecards.dev/projects/github.com/ORG/REPO/badge)](https://securityscorecards.dev/viewer/?uri=github.com/ORG/REPO)
[![OpenSSF Best Practices](https://www.bestpractices.dev/projects/PROJECT_ID/badge)](https://www.bestpractices.dev/projects/PROJECT_ID)
BadgeURL PatternMANDATORY
CI Statusgithub.com/ORG/REPO/actions/workflows/ci.yml/badge.svgYES
Codecovcodecov.io/gh/ORG/REPO/graph/badge.svgYES
OpenSSF Scorecardapi.securityscorecards.dev/projects/github.com/ORG/REPO/badgeYES
OpenSSF Best Practiceswww.bestpractices.dev/projects/PROJECT_ID/badgeYES

CI/CD Workflows (MANDATORY)

Every GitHub project MUST have these workflows in .github/workflows/:

WorkflowFilePurposeMANDATORY
CIci.ymlBuild, test, lintYES
CodeQLcodeql.ymlSecurity scanningYES
Scorecardscorecard.ymlOpenSSF ScorecardYES
Dependency Reviewdependency-review.ymlPR CVE checkYES

CI Must Include (MANDATORY)

RequirementImplementationMANDATORY
Coverage uploadcodecov/codecov-action after testsYES
Security auditcomposer audit / npm audit / govulncheckYES
SHA-pinned actionsAll actions use full SHA with version commentYES

Supply Chain Security (MANDATORY for Releases)

Supply chain security controls MUST block releases when violated.

ControlImplementationBlocks Release?
SLSA Provenanceslsa-github-generator workflowYES - no release without attestation
Signed Tagsgit tag -s before gh release createYES - unsigned tags rejected
SBOM Generationanchore/sbom-action or cyclonedxYES - SBOM required for compliance
Dependency Auditcomposer audit / npm audit fails CIYES - CVEs block merge

Release Workflow Order (MANDATORY)

Supply chain artifacts MUST be generated in this order:

1. CI passes (tests, lint, security audit)
     ↓
2. Create SIGNED tag locally: git tag -s vX.Y.Z
     ↓
3. Push signed tag: git push origin vX.Y.Z
     ↓
4. Create release on existing tag: gh release create vX.Y.Z
     ↓
5. SLSA provenance workflow triggers (workflow_run)
     ↓
6. Provenance attestation uploaded to release
     ↓
7. SBOM generated and uploaded

NEVER use gh release create without a pre-existing signed tag - this creates unsigned tags.

CI Integration for Supply Chain

Add to .github/workflows/release.yml:

# Pre-release checks (block release if failed)
- name: Security Audit
  run: |
    composer audit --format=plain || exit 1
    npm audit --audit-level=high || exit 1

# SBOM generation
- name: Generate SBOM
  uses: anchore/sbom-action@v0
  with:
    artifact-name: sbom.spdx.json
    output-file: sbom.spdx.json

- name: Upload SBOM to release
  run: gh release upload ${{ github.ref_name }} sbom.spdx.json
  env:
    GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}

Verification of Supply Chain Artifacts

Before announcing a release, verify:

  • Release tag is GPG/SSH signed: git tag -v vX.Y.Z
  • SLSA provenance exists: multiple.intoto.jsonl in release assets
  • SBOM exists: sbom.spdx.json or sbom.cyclonedx.json in release assets
  • No HIGH/CRITICAL CVEs: composer audit / npm audit clean

See references/slsa-provenance.md for detailed SLSA implementation guide.

OpenSSF Registration (MANDATORY)

  1. Register at bestpractices.dev: https://www.bestpractices.dev/en/projects/new
  2. Note the Project ID assigned after registration
  3. Add badge to README with correct PROJECT_ID
  4. Run Scorecard workflow to generate initial score

Codecov Setup (MANDATORY)

  1. Enable Codecov for the repository at codecov.io
  2. Collect coverage from ALL test suites (not just unit tests):
Test SuiteCoverage CommandOutput FileMANDATORY
Unitphpunit -c UnitTests.xml --coverage-clover.Build/coverage/unit.xmlYES
Integrationphpunit -c IntegrationTests.xml --coverage-clover.Build/coverage/integration.xmlYES
E2Ephpunit -c E2ETests.xml --coverage-clover.Build/coverage/e2e.xmlYES
Functionalphpunit -c FunctionalTests.xml --coverage-clover.Build/coverage/functional.xmlYES
JavaScriptnpm run test:coveragecoverage/lcov.infoYES (if JS exists)
  1. Upload ALL coverage files to Codecov:
    - uses: codecov/codecov-action@SHA # vX.Y.Z
      with:
        token: ${{ secrets.CODECOV_TOKEN }}  # MANDATORY - see below
        files: .Build/coverage/unit.xml,.Build/coverage/integration.xml,.Build/coverage/e2e.xml,coverage/lcov.info
        fail_ci_if_error: false
    

CODECOV_TOKEN (MANDATORY)

Never rely on tokenless uploads. They fail for protected branches and are unreliable.

RequirementImplementationWhy
Token in secretsAdd CODECOV_TOKEN to repo or org secretsAuthentication
Token in workflowtoken: ${{ secrets.CODECOV_TOKEN }}Required for protected branches
Org-level secretPreferred for consistency across reposSingle point of management

Failure without token:

Upload failed: {"message":"Token required because branch is protected"}

Get token from: https://app.codecov.io/gh/ORG/REPO/settings

Add as org secret (recommended):

# Organization-level (covers all repos)
gh secret set CODECOV_TOKEN --org netresearch --visibility all

# Or repository-level
gh secret set CODECOV_TOKEN --repo OWNER/REPO

JavaScript Coverage (MANDATORY for projects with JS/TS)

When a project contains JavaScript or TypeScript files:

  1. vitest.config.js MUST include lcov reporter for Codecov:

    coverage: {
        provider: 'v8',
        reporter: ['text', 'json', 'html', 'lcov'],  // lcov REQUIRED for Codecov
        reportsDirectory: 'coverage',
    }
    
  2. CI workflow MUST include JavaScript test job:

    - uses: actions/setup-node@SHA # vX.Y.Z
      with:
        node-version: '22'
    - run: npm install
    - run: npm run test:coverage
    
  3. Codecov upload MUST include coverage/lcov.info

Verification Checklist

Before marking enterprise-readiness complete, verify ALL:

  • README has CI badge linking to workflow
  • README has Codecov badge (not "unknown")
  • README has OpenSSF Scorecard badge (correct URL with api.securityscorecards.dev)
  • README has OpenSSF Best Practices badge (correct PROJECT_ID, not placeholder)
  • .github/workflows/ci.yml exists and uploads coverage
  • .github/workflows/codeql.yml exists
  • .github/workflows/scorecard.yml exists
  • Codecov shows actual coverage percentage
  • Scorecard shows actual score

If any badge shows "unknown", "invalid", or placeholder ID - FIX IT. Do not proceed.


OpenSSF Scorecard Optimization Playbook

Proven playbook to raise OpenSSF Scorecard from ~6.8 to ~9.0. Applied successfully on t3x-rte_ckeditor_image.

Check-by-Check Guide

CheckQuick FixImpact
Token-PermissionsMove all write perms from workflow-level to job-level0→10
Branch-ProtectionSet required_approving_review_count: 1 + auto-approve + protect release branches0→8
Code-ReviewAutomatic after Branch-Protection fix5→10
Security-PolicyPrivate vulnerability reporting + coordinated disclosure4→10
Pinned-DependenciesSHA-pin all actions (except SLSA generator — see below)8→10
FuzzingNot practical for PHP/TYPO3 — skip0 (accept)
CII-Best-PracticesComplete questionnaire at bestpractices.dev2→6+

Token-Permissions (0→10)

The scorecard flags ANY write permission at the workflow-level. Fix: declare permissions: contents: read (or permissions: {}) at workflow-level, move all write to job-level.

# ✅ CORRECT
permissions:
    contents: read

jobs:
    deploy:
        permissions:
            contents: write    # only this job gets write
        steps: ...

# ❌ WRONG — Scorecard flags this
permissions:
    contents: read
    pull-requests: write       # write at workflow level!

Common violators: pr-quality.yml, release-labeler.yml, create-release.yml.

Branch-Protection (0→8) for Solo Maintainers

Solo-dev projects need required_approving_review_count >= 1 but can't wait for human reviewers. Solution: auto-approve workflow + ruleset.

Default branch ruleset:

gh api repos/OWNER/REPO/rulesets/RULESET_ID -X PUT --input - <<'EOF'
{
  "rules": [{
    "type": "pull_request",
    "parameters": {
      "required_approving_review_count": 1,
      "dismiss_stale_reviews_on_push": true,
      "require_code_owner_review": false,
      "require_last_push_approval": true,
      "required_review_thread_resolution": true
    }
  }]
}
EOF

Release branch ruleset (e.g., TYPO3_*, release/*):

gh api repos/OWNER/REPO/rulesets -X POST --input - <<'EOF'
{
  "name": "release-branches",
  "enforcement": "active",
  "target": "branch",
  "conditions": {"ref_name": {"include": ["refs/heads/TYPO3_*"], "exclude": []}},
  "rules": [
    {"type": "deletion"},
    {"type": "non_fast_forward"},
    {"type": "pull_request", "parameters": {
      "required_approving_review_count": 1,
      "dismiss_stale_reviews_on_push": true,
      "require_code_owner_review": false,
      "require_last_push_approval": true,
      "required_review_thread_resolution": true,
      "allowed_merge_methods": ["merge"]
    }},
    {"type": "required_status_checks", "parameters": {
      "required_status_checks": [{"context": "Build ✓", "integration_id": 15368}],
      "strict_required_status_checks_policy": true
    }}
  ]
}
EOF

Also enable enforce_admins via legacy API (scorecard reads this separately from rulesets):

gh api repos/OWNER/REPO/branches/main/protection/enforce_admins -X POST

Pair with pr-quality.yml auto-approve workflow (see github-project skill) that approves non-fork PRs via github-actions[bot].

Codeowner review incompatibility: require_code_owner_review: true is incompatible with bot auto-approve workflows. github-actions[bot] (GITHUB_TOKEN) is not a codeowner — its APPROVED review does not satisfy the codeowner requirement, permanently blocking all PRs. Verified on t3x-rte_ckeditor_image#629. Keep this false when using auto-approve.

Unresolved review threads: required_review_thread_resolution: true will block merge if automated reviewers (Gemini Code Assist, Copilot) leave unresolved threads. Resolve via:

gh api graphql -f query='mutation { resolveReviewThread(input: {threadId: "PRRT_xxx"}) { thread { isResolved } } }'

Remaining scorecard warnings (unfixable for solo maintainer):

  • required approving review count is 1 — scorecard wants >= 2, impractical without human reviewers
  • codeowners review is not required — incompatible with bot auto-approve (see above)

Security-Policy (4→10)

The scorecard requires SECURITY.md with:

  1. Link to private reporting mechanism (not public issues!)
  2. Response timeline (e.g., 48h acknowledgment, 7d fix)
  3. Coordinated disclosure process

Template:

## Reporting a Vulnerability

**Please do NOT report security vulnerabilities through public GitHub issues.**

Instead, use [GitHub's private vulnerability reporting](https://github.com/ORG/REPO/security/advisories/new).

We will acknowledge receipt within 48 hours and aim to provide a fix
within 7 days for critical vulnerabilities.

## Coordinated Disclosure

After a fix is released, we will:
1. Publish a GitHub Security Advisory
2. Credit the reporter (unless anonymity is requested)
3. Include the fix in the next release with a CVE identifier if applicable

Enable private vulnerability reporting:

gh api repos/OWNER/REPO/private-vulnerability-reporting -X PUT

SLSA Generator Pinning Exception

The slsa-framework/slsa-github-generator reusable workflow cannot be SHA-pinned. It MUST use @vX.Y.Z tags — the slsa-verifier needs the tag to verify trusted builder identity. This is a known GitHub Actions limitation tracked as slsa-verifier#12.

Accept this as an unavoidable Pinned-Dependencies gap (score stays at 8, not 10).

Checks Not Worth Fixing

CheckWhy Skip
Fuzzing (0)OSS-Fuzz doesn't support PHP/TYPO3; ROI too low
Packaging (-1)TER publishing isn't detected as a packaging workflow
Signed-Releases (-1)Detection issue — SLSA provenance exists but isn't recognized

Assessment Workflow

  1. Discovery: Identify platform (GitHub/GitLab), languages, existing CI/CD
  2. Scoring: Apply checklists from references based on stack
  3. Badge Assessment: Check OpenSSF criteria status
  4. Gap Analysis: List missing controls by severity
  5. Implementation: Apply fixes using scripts and templates
  6. Verification: Re-score and compare (see Post-Implementation Verification)

Post-Implementation Verification

MANDATORY: After implementing improvements, re-assess the project to verify gains.

Re-Scoring Workflow

  1. Record baseline score before making changes (save output)
  2. Implement improvements following gap analysis priorities
  3. Re-run full assessment using same criteria
  4. Compare scores and document delta

Verification Checklist

CheckBeforeAfterDelta
OpenSSF Scorecard_/10_/10+_
Best Practices BadgeLevelLevelUpgrade?
Coverage %_%_%+_%
Enterprise Score_/100_/100+_

Expected Outcomes

ImplementationExpected Score Impact
Add CI/CD workflows+10-15 pts
Enable Codecov+5-10 pts
Add CodeQL/Scorecard+10-15 pts
SLSA provenance+5-10 pts
Documentation (SECURITY.md, etc.)+5-10 pts

Verification Commands

# OpenSSF Scorecard (re-run after changes merged to default branch)
scorecard --repo=github.com/ORG/REPO --format=json

# Coverage (after CI runs)
# Check Codecov dashboard or badge

# Best Practices (update at bestpractices.dev after implementing)
# Re-answer questions that are now satisfied

If score did not improve as expected, investigate:

  • Did CI workflows run successfully?
  • Are badges pointing to correct repository?
  • Did changes merge to default branch (required for Scorecard)?

Continuous Improvement

Enterprise readiness is not a one-time achievement. Maintain scores over time.

Scheduled Re-Assessment

FrequencyScopeTrigger
WeeklyBadge status checkAutomated (CI)
MonthlyScorecard re-runScheduled workflow
QuarterlyFull enterprise assessmentManual or milestone
Per-releaseSupply chain verificationRelease workflow

Automated Monitoring

Add badge health check to CI:

# .github/workflows/badge-health.yml
name: Badge Health Check
on:
  schedule:
    - cron: '0 6 * * 1'  # Weekly Monday 6am
  workflow_dispatch:

jobs:
  check-badges:
    runs-on: ubuntu-latest
    steps:
      - name: Check Codecov
        run: |
          BADGE_URL="https://codecov.io/gh/${{ github.repository }}/graph/badge.svg"
          curl -sL "$BADGE_URL" | grep -q "unknown" && echo "::warning::Codecov badge shows unknown" || true

      - name: Check Scorecard
        run: |
          SCORE=$(curl -s "https://api.securityscorecards.dev/projects/github.com/${{ github.repository }}" | jq -r '.score // "N/A"')
          echo "Current Scorecard: $SCORE/10"
          if [ "$SCORE" != "N/A" ] && [ "$(echo "$SCORE < 7" | bc -l)" = "1" ]; then
            echo "::warning::Scorecard dropped below 7.0"
          fi

Regression Detection

Watch for these warning signs:

SignalDetectionResponse
Scorecard drop > 1ptWeekly checkInvestigate changed checks
Badge shows "unknown"CI checkVerify token/configuration
CVE in dependencyDependabot/RenovatePriority update PR
Failed security scanCI workflowBlock release until fixed
Coverage drop > 5%PR checkRequire coverage recovery

Dependency Update Cadence

Update TypeFrequencyAutomation
Security patchesImmediateAuto-merge if tests pass
Minor updatesWeeklyRenovate/Dependabot PR
Major updatesMonthly reviewManual approval required

Dependency CVE Workflow

When assessing enterprise readiness, always run dependency audit as part of discovery:

# PHP/Composer
composer audit

# Node.js
npm audit

# Python
pip-audit

# Go
govulncheck ./...

CVE Handling Best Practice

Separate dependency updates from code changes:

PR TypeContentWhy
Code changesBusiness logic, bug fixes, featuresReviewable, testable in isolation
Dependency updatescomposer update, version bumpsClear diff, easy rollback if issues

Real-world example from t3x-cowriter review:

  • Found 4 CVEs during enterprise assessment
  • CVE fixes required composer update typo3/cms-core typo3/cms-backend
  • Kept separate from code fixes (JS bug, AGENTS.md updates) for clean PR history

CVE Severity Response

SeverityResponse TimeAction
CRITICALImmediateHotfix PR, expedited review
HIGH24-48 hoursPriority PR, security review
MEDIUM1 weekNormal PR cycle
LOWNext releaseBatch with other updates

CI Integration

Add dependency audit to CI pipeline:

# .github/workflows/ci.yml
- name: Security audit
  run: composer audit --format=plain

Reference Files (Load Based on Stack)

ReferenceWhen to Load
references/general.mdAlways (universal 60 pts)
references/github.mdGitHub-hosted projects (40 pts)
references/go.mdGo projects (20 pts)
references/openssf-badge-silver.mdPursuing Silver badge
references/openssf-badge-gold.mdPursuing Gold badge

Quality & Process References (Language-Agnostic)

ReferenceWhen to Load
references/code-review.mdCode review, PR quality checks
references/documentation.mdADRs, API docs, migration guides, changelogs
references/ci-patterns.mdCI/CD pipelines, Git hooks, quality gates

Explicit Content Triggers

When reviewing PRs or code, load references/code-review.md for the comprehensive checklist covering test resource management, state mutation, defensive enum handling, documentation accuracy, and defensive code coverage.

When writing ADRs (Architecture Decision Records), load references/documentation.md for templates, file organization, and required sections (Context, Decision, Consequences, Alternatives).

When writing changelogs or release notes, load references/documentation.md for Keep a Changelog format and conventional commit mapping.

When writing API documentation or migration guides, load references/documentation.md for structure patterns and completeness checklists.

When configuring CI/CD pipelines, load references/ci-patterns.md for comprehensive pipeline structure, job ordering, and quality gates.

When setting up Git hooks (pre-commit/pre-push), load references/ci-patterns.md for the hook division strategy and Lefthook configuration.

When enforcing coverage thresholds, load references/ci-patterns.md for threshold tables and enforcement patterns.

When handling signed commits with rebase-only merge, load references/ci-patterns.md for the local fast-forward merge workflow.

Implementation Guides

GuidePurpose
references/quick-start-guide.mdGetting started
references/dco-implementation.mdDCO enforcement
references/signed-releases.mdCosign/GPG signing
references/reproducible-builds.mdDeterministic builds
references/security-hardening.mdTLS, headers, validation
references/solo-maintainer-guide.mdN/A criteria justification
references/branch-coverage.mdGold 80% branch coverage

Automation Scripts

ScriptPurpose
scripts/verify-badge-criteria.shVerify OpenSSF badge criteria
scripts/check-coverage-threshold.shStatement coverage check
scripts/check-branch-coverage.shBranch coverage (Gold)
scripts/add-spdx-headers.shAdd SPDX headers (Gold)
scripts/verify-signed-tags.shTag signature verification
scripts/verify-review-requirements.shPR review requirements

Document Templates

Templates in assets/templates/:

  • GOVERNANCE.md - Project governance (Silver)
  • ARCHITECTURE.md - Technical docs (Silver)
  • CODE_OF_CONDUCT.md - Contributor Covenant v3.0
  • SECURITY_AUDIT.md - Security audit (Gold)
  • BADGE_EXCEPTIONS.md - N/A justifications

CI Workflow Templates

GitHub Actions workflows in assets/workflows/:

WorkflowPurpose
scorecard.ymlOpenSSF Scorecard security analysis
codeql.ymlSemantic code security scanning
dependency-review.ymlPR dependency CVE/license check
slsa-provenance.ymlSLSA Level 3 build attestation
dco-check.ymlDeveloper Certificate of Origin

Copy workflows to .github/workflows/ and pin action versions with SHA hashes.

Scoring Interpretation

ScoreGradeStatus
90-100AEnterprise Ready
80-89BProduction Ready
70-79CDevelopment Ready
60-69DBasic
<60FNot Ready

Code Review Quick Checklist

Before approving PRs, verify (see references/code-review.md for details):

  • One resource per test - No duplicate instances
  • State mutation complete - Tracking fields updated after operations
  • Defensive enum handling - Valid() method, default case, tested
  • Documentation accurate - Claims match benchmarks, trade-offs noted
  • Platform code marked - Limitations documented, alternatives provided
  • Defensive code tested - Error paths and edge cases covered

Critical Rules

  • NEVER interpolate ${{ github.event.* }} in run: blocks (script injection)
  • NEVER guess action versions - always fetch from GitHub API
  • ALWAYS use SHA pins for actions with version comments
  • ALWAYS verify commit hashes against official tags

Related Skills

SkillPurpose
go-developmentGo code patterns, Makefile interface, testing
github-projectRepository setup, branch protection, auto-merge
security-auditDeep security audits (OWASP, XXE, SQLi)
git-workflowGit branching, commits, PR workflows

Resources


Contributing: Improvements to this skill should be submitted to the source repository: https://github.com/netresearch/enterprise-readiness-skill

Source

git clone https://github.com/eugenepyvovarov/mcpbundler-agent-skills-marketplace/blob/main/enterprise-readiness-skill/SKILL.mdView on GitHub

Overview

Enterprise Readiness assesses software projects for production readiness, focusing on security, quality, and automation. It enforces supply chain security (SLSA, signing, SBOMs), hardens CI/CD pipelines, establishes quality gates, and guides documentation like ADRs, changelogs, and migration guides, aligning with OpenSSF Scorecard, Best Practices badges, SLSA, and S2C2F.

How This Skill Works

The skill evaluates projects against mandatory requirements such as README badges and CI/CD workflows (ci.yml, codeql.yml, scorecard.yml, dependency-review.yml) and enforces controls like code coverage uploads, security audits, and SHA-pinned actions. It also enforces supply chain controls (SLSA provenance, signed tags, SBOM generation) and requires dependency audits before releases, while guiding PR reviews and documentation to meet enterprise standards.

When to Use It

  • Evaluating projects for production/enterprise readiness
  • Implementing supply chain security (SLSA, signing, SBOMs)
  • Hardening CI/CD pipelines
  • Establishing quality gates
  • Pursuing OpenSSF Best Practices Badge (Passing/Silver/Gold)

Quick Start

  1. Step 1: Audit your repo for mandatory badges and ensure README.md badge placement matches the required order
  2. Step 2: Enable and configure CI/CD workflows (ci.yml, codeql.yml, scorecard.yml, dependency-review.yml) and set up SLSA provenance, signed tags, and SBOM generation
  3. Step 3: Add ADRs, changelogs, and migration guides; review PRs for quality and pursue OpenSSF Best Practices badge

Best Practices

  • Audit for mandatory README badges (CI, Codecov, OpenSSF Scorecard, OpenSSF Best Practices) at the top of README.md in the required order
  • Maintain CI/CD workflows: ci.yml, codeql.yml, scorecard.yml, dependency-review.yml
  • Enforce SHA-pinned actions and ensure code coverage and security audits run in CI
  • Implement supply chain controls: SLSA provenance, signed tags, SBOM generation, and dependency audits
  • Document ADRs, changelogs, and migration guides; review PRs for quality and consistency

Example Use Cases

  • A repository that displays mandatory badges in the correct order on README.md and has all required GitHub workflows configured
  • A project implementing SLSA provenance, signed releases, and SBOM generation before deployment
  • A library with ADRs, migration guides, and comprehensive changelogs accompanying releases
  • An enterprise-grade open-source project achieving OpenSSF Best Practices badge levels (Passing/Silver/Gold)
  • A multi-repo service with hardened CI/CD pipelines and quality gates integrated into PR reviews

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers