Developer Enablement Briefing — July 10, 2024
OpenSSF Scorecard 5.0 introduces structured probes, maintainer annotations, and new supply-chain checks, requiring engineering, security, and compliance teams to update automation, APIs, and risk reporting workflows.
Executive briefing: The Open Source Security Foundation (OpenSSF) released Scorecard 5.0 on 10 July 2024, delivering the most significant upgrade since the project’s inception. Scorecard evaluates open-source repositories against a set of supply-chain security checks; the new version breaks the monolithic scoring model into structured probes, introduces maintainer annotations, refactors the API, and expands checks across SBOM publication, packaging, and dependency management ecosystems. Engineering leaders should plan upgrades to automation pipelines, policy-as-code rules, and governance dashboards to capitalise on the richer telemetry while staying compatible with the new Go module layout.
Structured Results allow organisations to select individual probes within each check, enabling custom policies (e.g., requiring signed releases and fuzzing while downweighting other heuristics). Maintainer annotations provide project maintainers with a mechanism to clarify when Scorecard cannot observe a control, reducing false positives. Breaking API changes migrate packages from github.com/ossf/scorecard/v4/pkg to github.com/ossf/scorecard/v5/pkg/scorecard, simplify Run signatures, and adjust formatting options. New or improved checks cover SBOM publication, Gradle wrapper verification, Scala Steward detection, NuGet restore support, and packaging workflows such as sbt ci-release. Dependency diff functionality has been removed, and OneFuzz detection retired due to deprecation. Organisations embedding Scorecard into CI/CD, dependency intake, or third-party risk workflows must update integrations promptly.
Key enhancements
- Structured probes: Each of the 19 checks is decomposed into granular probes; the CLI supports the
--probesflag with--format probeto output targeted results, enabling custom control mapping. - Maintainer annotations: Maintainers can provide context (e.g., “not-detected”) when practices exist but cannot be inferred automatically; consumers can use
--show-annotationsto display them. - API simplification: The
RunScorecardfunction becomesRunwith streamlined parameters, default clients, and options structs for advanced use cases. - SBOM and packaging coverage: Experimental SBOM publication detection, Gradle wrapper validation, NuGet restore support, Scala Steward and
sbt ci-releaserecognition expand the visibility of supply-chain practices. - Probe additions: New probe surfaces release provenance verification, enhancing policy checks for signed or provenance-backed releases.
Impact assessment for enterprises
- CI/CD pipelines: Workflows invoking Scorecard must pin to
v5modules, adjust CLI flags for probes, and account for removed dependency diff features. - Security policy automation: Policy engines (e.g., Open Policy Agent, GitHub branch protection gates) can now use probe-level data to enforce nuanced requirements such as SBOM publication or packaging best practices.
- Third-party risk reviews: Procurement and risk teams can request structured Scorecard reports from suppliers, enabling more precise attestation of open-source dependencies.
- Developer enablement: Documentation and training must explain new probes, annotation workflows, and how teams can respond to Scorecard findings.
- Tool integrations: Products embedding Scorecard (security scanners, dependency tools) must update API calls and data schemas to accommodate
v5.
Control mapping
- NIST Secure Software Development Framework (SSDF): Map structured probes to practices such as PO.3.2 (maintain provenance), PW.4.1 (address vulnerabilities), and RV.1.2 (collect evidentiary data).
- SLSA and supply-chain regulations: Use SBOM and provenance probes to evidence compliance with SLSA Level 2+, U.S. OMB M-22-18, and forthcoming EU Cyber Resilience Act requirements.
- ISO/IEC 27034 and 27001: Integrate Scorecard telemetry with secure development life cycle controls and vulnerability management metrics.
- Internal open-source program offices (OSPO): Embed Scorecard 5.0 into intake reviews, backlog prioritisation, and community engagement dashboards.
Implementation roadmap
| Phase | Timeline | Activities |
|---|---|---|
| Assessment | Weeks 1–2 | Inventory Scorecard usage across CI/CD, release pipelines, supply-chain monitoring, and risk reports; identify owners and dependencies. |
| Design | Weeks 3–5 | Define probe policies, update architecture diagrams, determine annotation governance, and plan API migration. |
| Execution | Weeks 6–10 | Upgrade modules, adjust workflows, configure --probes output, and integrate SBOM/provenance checks. |
| Validation | Weeks 11–12 | Run regression tests, compare Scorecard 4.x vs 5 results, review annotations, and update dashboards. |
| Operationalisation | Ongoing | Monitor metrics, refine probe selections, and share insights with engineering and leadership. |
Governance and ownership
- Security engineering: Owns toolchain upgrades, policy definitions, and integration with vulnerability management systems.
- DevOps and platform teams: Maintain CI/CD configurations, ensure Scorecard runs efficiently, and manage compute costs.
- OSPO / open-source governance: Coordinates with upstream maintainers, manages annotation submissions, and curates approved dependencies.
- Risk and compliance: Consumes probe data for third-party assessments and regulatory reporting.
- Product teams: Incorporate Scorecard results into release readiness and customer trust communications.
Metrics and reporting
- Percentage of critical dependencies evaluated with Scorecard 5.0, broken down by risk tier.
- Probe coverage across key domains (build integrity, code review, dependency management, SBOM, provenance).
- Number of maintainer annotations processed, resolved, or escalated.
- Time to remediate failing probes or checks after detection.
- Integration completeness: proportion of pipelines migrated to v5 APIs and CLI options.
Enablement and documentation
- Update internal runbooks detailing CLI usage (
--probes,--format probe,--show-annotations), API changes, and data schemas. - Develop playbooks for interpreting structured results and mapping them to remediation tasks.
- Provide guidance for upstream maintainers on submitting annotations and clarifying security practices.
- Communicate dependency diff deprecation and alternatives, such as GitHub’s dependency review action.
90-day action plan
- Days 1–30: Freeze Scorecard 4.x usage, assess integrations, and pilot Scorecard 5.0 on representative repositories; document API migration steps.
- Days 31–60: Roll out structured probes in CI/CD, configure policy enforcement, capture annotations, and refresh reporting dashboards.
- Days 61–90: Complete migration for all pipelines, integrate probe data with GRC systems, and share programme outcomes with executives and open-source partners.
Integration examples
- GitHub Actions: Update workflows using
ossf/scorecard-actionto referencev5, configureresults_fileoutputs, and feed probe data into SARIF uploads for Code Scanning insights. - GitLab CI/CD: Package Scorecard 5.0 as a container job, export probe JSON to GitLab security dashboards, and trigger merge request approvals based on failing probes.
- Artifact repositories: Integrate Scorecard checks into package promotion pipelines (e.g., Artifactory, Nexus) to block releases lacking provenance or SBOM signals.
- Policy-as-code: Use OPA/Rego or HashiCorp Sentinel policies to parse probe JSON and enforce internal gates, mapping outcomes to severity tiers.
Risk scenarios addressed
- Unsigned releases: Probe-level data surfaces missing provenance or signing, enabling targeted remediation before deploying dependencies.
- Dependency management gaps: Enhanced packaging and dependency update detection highlight ecosystems (NuGet, Scala) previously under-covered.
- False positives: Maintainer annotations reduce the risk of rejecting dependencies that comply through alternative mechanisms.
- Automation drift: API refactors encourage more maintainable integrations with fewer bespoke parameters.
Stakeholder communications
- Publish Scorecard 5.0 adoption roadmaps for executive sponsors, emphasising alignment with national secure software requirements and customer commitments.
- Brief customers and partners on how structured probes improve transparency and auditing of dependencies.
- Coordinate with legal and compliance teams to ensure updated policies reflect Scorecard-derived evidence, especially for software attestation obligations.
Zeph Tech helps engineering and security organisations operationalise OpenSSF Scorecard 5.0—upgrading toolchains, tuning probe policies, and translating supply-chain insights into actionable governance and assurance.
Continue in the Developer pillar
Return to the hub for curated research and deep-dive guides.
Latest guides
-
Secure Software Supply Chain Tooling Guide — Zeph Tech
Engineer developer platforms that deliver verifiable provenance, SBOM distribution, vendor assurance, and runtime integrity aligned with SLSA v1.0, NIST SP 800-204D, and CISA SBOM…
-
AI-Assisted Development Governance Guide — Zeph Tech
Govern GitHub Copilot, Azure AI, and internal generative assistants with controls aligned to NIST AI RMF 1.0, EU AI Act enforcement timelines, OMB M-24-10, and enterprise privacy…
-
Developer Enablement & Platform Operations Guide — Zeph Tech
Plan AI-assisted development, secure SDLC controls, and runtime upgrades using Zeph Tech research on GitHub Copilot, GitHub Advanced Security, and major language lifecycles.




