Skip to content

feat: Update titles & objectives for brevity and consistency#456

Open
eddie-knight wants to merge 2 commits intoossf:mainfrom
eddie-knight:feat/objectives
Open

feat: Update titles & objectives for brevity and consistency#456
eddie-knight wants to merge 2 commits intoossf:mainfrom
eddie-knight:feat/objectives

Conversation

@eddie-knight
Copy link
Contributor

Rewrite all titles, and adjust some objectives to ensure consistency

Signed-off-by: Eddie Knight <knight@linux.com>
Signed-off-by: Eddie Knight <knight@linux.com>
@eddie-knight eddie-knight changed the title feat: Enforce brevity and consistency in titles & objectives feat: Update titles & objectives for brevity and consistency Jan 1, 2026
Copy link
Contributor

@trumant trumant left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These changes add clarity and I don't see any obvious downsides

Copy link
Contributor

@funnelfiasco funnelfiasco left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like these overall. I want to come back to it again in a day or two and look in detail to see if there are changes I want to suggest tweaks to.

Copy link
Contributor

@evankanderson evankanderson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for simplifying these! If we could enforce an e.g. 70-character limit on the titles, it would make it a lot easier to present the different OSPS checks with human language in addition to the lovely category-number-subnumber that we all know today.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think these changes are heading in the right direction, but they also expand the scope of the baseline controls. The existing items mostly talk about managing the version control system, but the new wording would reasonably also include other project resources such as distribution channels (e.g. NPM publishing, etc).

title: |
The project's version control system MUST prevent unintentional
modification of the primary branch.
Protect the Primary Branch.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I feel like this needs a little more description of the protection (i.e. protect from accidental modification).

Also, this title ends with a ., while none of the others do.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Protect the Primary Branch.
Protect the Primary Branch from Accidental Modification

objective: |
All released software assets MUST be signed or accounted for in a
signed manifest including each asset's cryptographic hashes.
Ensure released software assets can be verified by users to ensure
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It seems like we're also removing MUST language from a bunch of places. What's the rationale there?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We started moving the "MUST" bits to requirements statements with the objective being more of a summary statement... but we didn't ever swing back to make sure there is consistency in those objectives

title: |
The project documentation MUST provide user guides for all basic
functionality.
Publish User Guides for All Basic Functionality
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Publish User Guides for All Basic Functionality
Publish User Guides for Basic Functionality

I'm not sure that "all" is doing useful work here. You can simply move the functionality line if you have something not well documented, as long as there is some documentation existing.

- id: OSPS-DO-02
title: |
The project MUST provide a mechanism for reporting defects.
Provide Mechanism for Reporting Defects
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Provide Mechanism for Reporting Defects
Provide Mechanisms for Reporting Defects

- id: OSPS-SA-03
title: |
The project MUST assess the security posture of all software assets.
Publish Security Assessment
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"Publish" seems to be a new requirement -- is it required that the assessment be made public, or can it be held privately by the maintainers?

Comment on lines +116 to +118
Enable external parties to easily understand who they should contact
in the event that a vulnerability is found, and what process they should
follow.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I liked the old version better, I think, though I could be convinced otherwise.

Consumers of the project must be informed about known vulnerabilities
found within the project.
Ensure that project end users have a well known mechanism to understand
vulnerabilities found within the project.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This feels like it moved from "publish CVEs" to "analyze previous vulnerabilities". Maybe it's "Publish Data About ..." with the shorter title. Would "Publish Discovered Vulnerabilities" be an acceptable title?

Comment on lines +304 to +306
Identify and address defects and security weaknesses in the project's
imported code early in the development process, reducing the risk of
shipping insecure software.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The previous version included the idea of a "threshold for remediation" -- i.e. that vulnerabilities below a certain threshold might not be addressed. (Hello JS ReDOS spam!)

I'm indifferent to the "before software is merged" part -- that feels like a nice-to-have rather than a requirement.

title: |
The project documentation MUST enforce a policy that defines a
threshold for remediation of SAST findings.
Publish and Enforce an Application Security Testing Policy
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We didn't previously have a lexicon entry for SAST, but "Application Security Testing Policy" feels a little vague if we're trying to say "there are many fine SAST tools free for OSS, use one!".

I guess we have "publish" because the previous version says that the documentation MUST enforce the policy, to give wiggle room for "run this SAST tool locally before sending a PR".

We've also lost the "threshold" idea here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants