Description
Summary
Some of the changes introduced in #3438 lowered our OpenSSF Scorecard due to both pinned dependencies and actions using the latest
tag instead of a commit hash.
Specifically, the two are:
Which correspond to these two alerts:
- https://github.com/aws-powertools/powertools-lambda-typescript/security/code-scanning/77
- https://github.com/aws-powertools/powertools-lambda-typescript/security/code-scanning/76
Note that neither of them involves code that we ship to customers, this is only automation used for us to bootstrap new regions we use to deploy resources.
Why is this needed?
So we can restore our OpenSSF Scorecard score.
Which area does this relate to?
Other
Solution
The first should use a commit hash, similar to what we do here.
The second one should use the CDK version already present in the monorepo rather than install a different one.
Acknowledgment
- This request meets Powertools for AWS Lambda (TypeScript) Tenets
- Should this be considered in other Powertools for AWS Lambda languages? i.e. Python, Java, and .NET
Future readers
Please react with 👍 and your use case to help us understand customer demand.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status
Shipped