Hi,
While reviewing Forgejo against the OpenSSF Best Practices criteria [1], I noticed that Forgejo already runs several security-relevant static analysis checks (such as govulncheck, go vet, and golangci-lint) as part of its normal development workflow and CI.
I could not find a concise place in the documentation that explicitly describes which CI checks are considered part of Forgejo’s security or release quality expectations. During the review, this made it harder to distinguish between intentional project practice and incidental tooling.
Consider briefly documenting which security-relevant checks are expected to pass in CI, and that releases are cut from code that has passed these checks. This could be a short section in the developer or security documentation.
From the project’s perspective, documenting this would make existing security practices easier to understand for new contributors, downstream packagers, distributions, and organizations evaluating Forgejo for adoption. It can reduce repeated questions about what is enforced in CI, strengthen trust in the project’s security posture, and lower the effort needed to respond to external reviews — without changing any current behavior.
Thanks for the continued work on Forgejo.
1 - https://www.bestpractices.dev/en/projects/11645/passing#all
Hi,
While reviewing Forgejo against the OpenSSF Best Practices criteria [1], I noticed that Forgejo already runs several security-relevant static analysis checks (such as govulncheck, go vet, and golangci-lint) as part of its normal development workflow and CI.
I could not find a concise place in the documentation that explicitly describes which CI checks are considered part of Forgejo’s security or release quality expectations. During the review, this made it harder to distinguish between intentional project practice and incidental tooling.
Consider briefly documenting which security-relevant checks are expected to pass in CI, and that releases are cut from code that has passed these checks. This could be a short section in the developer or security documentation.
From the project’s perspective, documenting this would make existing security practices easier to understand for new contributors, downstream packagers, distributions, and organizations evaluating Forgejo for adoption. It can reduce repeated questions about what is enforced in CI, strengthen trust in the project’s security posture, and lower the effort needed to respond to external reviews — without changing any current behavior.
Thanks for the continued work on Forgejo.
1 - https://www.bestpractices.dev/en/projects/11645/passing#all