Some checks failed
Lighthouse CI / Lighthouse Audit (push) Waiting to run
Lighthouse CI / Axe Accessibility Audit (push) Waiting to run
Manifest Integrity / Validate Schema Integrity (push) Waiting to run
Manifest Integrity / Validate Contract Documents (push) Waiting to run
Manifest Integrity / Validate Pack Fixtures (push) Waiting to run
Manifest Integrity / Audit SHA256SUMS Files (push) Waiting to run
Manifest Integrity / Verify Merkle Roots (push) Waiting to run
Policy Lint & Smoke / policy-lint (push) Waiting to run
Policy Simulation / policy-simulate (push) Waiting to run
Docs CI / lint-and-preview (push) Has been cancelled
Export Center CI / export-ci (push) Has been cancelled
Findings Ledger CI / build-test (push) Has been cancelled
Findings Ledger CI / migration-validation (push) Has been cancelled
Findings Ledger CI / generate-manifest (push) Has been cancelled
- Implemented tests for Cryptographic Failures (A02) to ensure proper handling of sensitive data, secure algorithms, and key management. - Added tests for Security Misconfiguration (A05) to validate production configurations, security headers, CORS settings, and feature management. - Developed tests for Authentication Failures (A07) to enforce strong password policies, rate limiting, session management, and MFA support. - Created tests for Software and Data Integrity Failures (A08) to verify artifact signatures, SBOM integrity, attestation chains, and feed updates.
53 lines
1.6 KiB
JSON
53 lines
1.6 KiB
JSON
{
|
|
"$schema": "https://json-schema.org/draft/2020-12/schema",
|
|
"$id": "https://stella-ops.org/schemas/evidence.stella/v1.json",
|
|
"title": "Evidence Predicate Schema",
|
|
"description": "Schema for evidence.stella/v1 predicate type - raw evidence from scanner or feed",
|
|
"type": "object",
|
|
"required": [
|
|
"source",
|
|
"sourceVersion",
|
|
"collectionTime",
|
|
"sbomEntryId",
|
|
"rawFinding",
|
|
"evidenceId"
|
|
],
|
|
"properties": {
|
|
"source": {
|
|
"type": "string",
|
|
"minLength": 1,
|
|
"description": "Scanner or feed name that produced this evidence"
|
|
},
|
|
"sourceVersion": {
|
|
"type": "string",
|
|
"pattern": "^[0-9]+\\.[0-9]+\\.[0-9]+.*$",
|
|
"description": "Version of the source tool"
|
|
},
|
|
"collectionTime": {
|
|
"type": "string",
|
|
"format": "date-time",
|
|
"description": "UTC timestamp when evidence was collected"
|
|
},
|
|
"sbomEntryId": {
|
|
"type": "string",
|
|
"pattern": "^sha256:[a-f0-9]{64}:pkg:.+",
|
|
"description": "Reference to the SBOM entry this evidence relates to"
|
|
},
|
|
"vulnerabilityId": {
|
|
"type": "string",
|
|
"pattern": "^(CVE-[0-9]{4}-[0-9]+|GHSA-.+)$",
|
|
"description": "CVE or vulnerability identifier if applicable"
|
|
},
|
|
"rawFinding": {
|
|
"type": ["object", "string"],
|
|
"description": "Pointer to or inline representation of raw finding data"
|
|
},
|
|
"evidenceId": {
|
|
"type": "string",
|
|
"pattern": "^sha256:[a-f0-9]{64}$",
|
|
"description": "Content-addressed ID of this evidence (hash of canonical JSON)"
|
|
}
|
|
},
|
|
"additionalProperties": false
|
|
}
|