Get the FREE Ultimate OpenClaw Setup Guide →

enterprise-readiness

npx machina-cli add skill netresearch/enterprise-readiness-skill/enterprise-readiness --openclaw
Files (1)
SKILL.md
3.4 KB

Enterprise Readiness Assessment

When to Use

  • Evaluating projects for production/enterprise readiness
  • Implementing supply chain security (SLSA, signing, SBOMs)
  • Hardening CI/CD pipelines
  • Establishing quality gates
  • Pursuing OpenSSF Best Practices Badge (Passing/Silver/Gold)
  • Pursuing OpenSSF OSPS Baseline levels (1/2/3)
  • Reviewing code or PRs for quality
  • Writing ADRs, changelogs, or migration guides
  • Configuring Git hooks or CI pipelines

Quick Reference

Required badges: CI Status, Codecov, OpenSSF Scorecard, Best Practices, Baseline. Required workflows: ci.yml, codeql.yml, scorecard.yml, dependency-review.yml. See references/badges-and-workflows.md for URL patterns and Scorecard quick wins.

Assessment Workflow

  1. Discovery: Identify platform, languages, existing CI/CD
  2. Scoring: Apply checklists from references based on stack
  3. Badge Assessment: Check OpenSSF criteria status
  4. Gap Analysis: List missing controls by severity
  5. Implementation: Apply fixes using scripts and templates
  6. Verification: Re-score and compare

References

ReferenceWhen to Load
references/badges-and-workflows.mdBadge URLs, workflow list, Scorecard quick wins
references/general.mdAlways (universal checks)
references/github.mdGitHub-hosted projects
references/go.mdGo projects
references/mandatory-requirements.mdBadge/workflow/Codecov setup checklist
references/scorecard-playbook.mdRaising Scorecard ~6.8 to ~9.0
references/cve-workflow.mdCVE triage and response
references/code-review.mdPR quality checks
references/documentation.mdADRs, changelogs, migration guides
references/ci-patterns.mdCI/CD pipelines, Git hooks
references/openssf-badge-silver.mdSilver badge criteria
references/openssf-badge-gold.mdGold badge criteria
references/openssf-badge-baseline.mdOSPS Baseline levels 1/2/3
references/badge-submission-api.mdProgrammatic badge data submission gotchas
references/slsa-provenance.mdSLSA Level 3 implementation
references/signed-releases.mdCosign/GPG signing
references/solo-maintainer-guide.mdN/A criteria justification

Scripts & Templates

DirectoryContents
scripts/Badge verification, coverage checks, SPDX headers, signed tag verification

Critical Rules

  • NEVER interpolate ${{ github.event.* }} in run: blocks (script injection)
  • NEVER guess action versions -- always fetch from GitHub API
  • ALWAYS use SHA pins for actions with version comments
  • ALWAYS verify commit hashes against official tags
  • ALWAYS include https:// URLs in badge justification text (platform rejects criteria without URLs)
  • NEVER URL-decode session cookies when submitting badge data (breaks authentication silently)

Related Skills

SkillPurpose
go-developmentGo code patterns, testing
github-projectRepository setup, branch protection
security-auditDeep security audits (OWASP, XXE, SQLi)
git-workflowGit branching, commits, PR workflows

Source

git clone https://github.com/netresearch/enterprise-readiness-skill/blob/main/skills/enterprise-readiness/SKILL.mdView on GitHub

Overview

The Enterprise Readiness Assessment helps teams evaluate projects for production readiness, implement supply chain security (SLSA, signing, SBOMs), harden CI/CD pipelines, and establish quality gates. It also guides pursuing OpenSSF Best Practices Badges and OSPS baselines through structured discovery, scoring, gap analysis, and remediation.

How This Skill Works

Start with Discovery to identify platform, languages, and existing CI/CD. Then score against stack-specific OpenSSF criteria using referenced checklists, and perform a Badge Assessment. Finally, conduct Gap Analysis, implement fixes with scripts and templates, and re-score to verify improvements.

When to Use It

  • Evaluating projects for production/enterprise readiness
  • Implementing supply chain security (SLSA, signing, SBOMs)
  • Hardening CI/CD pipelines and establishing quality gates
  • Pursuing OpenSSF Best Practices Badge (Passing/Silver/Gold) and OSPS Baseline levels (1/2/3)
  • Reviewing code or PRs for quality and writing ADRs, changelogs, or migration guides

Quick Start

  1. Step 1: Discovery — identify platform, languages, and existing CI/CD setup
  2. Step 2: Assessment — apply references-based checklists and confirm required badges/workflows
  3. Step 3: Implement & Verify — apply fixes via scripts/templates and re-score to verify improvements

Best Practices

  • Track and enforce required badges: CI Status, Codecov, OpenSSF Scorecard, Best Practices, Baseline, and associated workflows (ci.yml, codeql.yml, scorecard.yml, dependency-review.yml)
  • Adopt SLSA provenance, code signing, and SBOM generation for all releases
  • Harden CI/CD with documented patterns, Git hooks, and secure pipeline configurations
  • Conduct regular gap analyses and remediation using templated scripts and templates
  • Aim for OpenSSF Best Practices Badge levels (Passing/Silver/Gold) and OSPS Baseline levels (1/2/3) with verifiable evidence

Example Use Cases

  • A project implements SLSA provenance and cryptographic signing for releases to pursue Gold badge
  • Teams run OpenSSF Scorecard assessments, identify gaps, and close controls across CI/CD and dependencies
  • ADR-driven documentation, along with ADRs, changelogs, and migration guides, accompany major upgrades
  • CI pipelines are hardened with ci.yml, codeql.yml, and dependency-review.yml plus Git hook checks
  • SBOMs and signing are integrated into the release flow to meet enterprise governance standards

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers