Add OpenSSF Best Practices Badge#14342
Conversation
|
Erlang/OTP is on the same boat with static analysis for Erlang, except that we also use CodeChecker for C/C++ and dynamic analysis for the C/C++ parts (valgrind). What you wrote seems reasonable to me, and I think enough to get the passing badge. |
kikofernandez
left a comment
There was a problem hiding this comment.
Looks good to me and reasonable.
Dialyzer is a good static analysis tool, not a type system, so that criteria is met.
Regarding Security coding tools, I only know of SAFE from Erlang Solutions and it is not free (AFAIK).
|
💚 💙 💜 💛 ❤️ |
|
Hey All, SAFE is a static analysis tool which is free for Open source, please send an email to safe@erlang-solutions.com and we will assist with it. The documentation is here |
|
@mohamedalikhechine I'm personally in favor of adding scanners to improve the quality / security of Elixir. For the scope of the best practices badge, I'm not sure if SAFE would be helpful since it is not FLOSS. |
Changes
Best Practices
I've filled out the form to the best of my knowledge, the answers can be seen here: https://www.bestpractices.dev/en/projects/10187
Approving this PR is also about making sure that the info there is correct.
Unmet SUGGESTED practices
For
SUGGESTEDbest practices, we can decide to ignore them and still pass the badge. The following have been marked asUNMET:We currently do not have any test coverage reporting, it would be good to add a coverage reporter to the setup. - I have started exploring this here: Test Coverage Reporting #14343
We're currently using dialyzer, as well as various small tools like shellcheck and markdown lint. But we're not employing any static analysis on the Erlang / Elixir code focused on security. While there is tools in the ecosystem, such as elvis, sobelow, credo etc. I'm not convinced that they would have an impact on this repository.
To my knowledge we're not employing any dynamic analysis tools, and I also can't think of one that would make sense to use.