| ▲ | Show HN: OSS sustain guard – Sustainability signals for OSS dependencies(onukura.github.io) | |||||||
| 21 points by onukura 2 days ago | 6 comments | ||||||||
Hi HN, I made OSS Sustain Guard. After every high-profile OSS incident, I wonder about the packages I rely on right now. I can skim issues/PRs and activity on GitHub, but that doesn’t scale when you have tens or hundreds of dependencies. I built this to surface sustainability signals (maintainer redundancy, activity trends, funding links, etc.) and create awareness. It’s meant to start a respectful conversation, not to judge projects. These are signals, not truth; everything is inferred from public data (internal mirrors/private work won’t show up). Quick start: pip install oss-sustain-guard export GITHUB_TOKEN=... os4g check It uses GitHub GraphQL with local caching (no telemetry; token not uploaded/stored), and supports multiple ecosystems (Python/JS/Rust/Go/Java/etc.). Repo: https://github.com/onukura/oss-sustain-guard I’d love feedback on metric choices/thresholds and wording that stays respectful. If you have examples where these signals break down, please share. | ||||||||
| ▲ | abhisek 21 hours ago | parent | next [-] | |||||||
I still think metadata associated with packages (like stars, download count and more) are easy to fake and not the best metric. OpenSSF scorecard has some adoption among project maintainers but hardly any adoption in terms of making security decision based on it. IMHO code is the source of truth. It may seem infeasible to mass analyse OSS code, but given the recent incidents (Shai-Hulud et.al) I think that’s the way forward. Personally am more bullish on SLSA or other artefact provenance technology adoption. Till that happens, metadata will be misused by attackers. | ||||||||
| ||||||||
| ▲ | regenschutz 2 days ago | parent | prev | next [-] | |||||||
Interesting project! Though, it's usually the smaller and less known-about projects that fall victim to OSS supply-chain attacks (such as the XZ attack). Since this is a manual check, I worry that most users will just check the big and grandiose dependencies that they have. Who would you say are your target audience with this tool? OSS developers? Security researchers? Regular users? Corporate managers? | ||||||||
| ||||||||
| ▲ | jimt1234 2 days ago | parent | prev [-] | |||||||
Not trying to hate, but these projects come to mind: https://cloud.google.com/security/products/assured-open-sour... | ||||||||
| ||||||||