Skip to content

Remediation Priority

Key Insight

Prioritize Branch-Protection fixes based on repository criticality and team capacity.

Remediation Priority

Order of implementation for fastest score improvement:

  1. Dependency-Update-Tool (0.5 hours) - Add Renovate or Dependabot config
  2. Branch-Protection (1 to 2 hours) - Configure branch protection with all required settings

Total estimated effort: 1.5 to 2.5 hours for both checks.

Quick win: Add Dependabot config first (10 minutes), then configure branch protection while waiting for Scorecard to rescan.


Check Interactions

Branch-Protection + Code-Review:

Branch protection enforces code review requirements. These two checks measure the same control from different angles:

  • Branch-Protection: Configuration exists
  • Code-Review: Configuration is actually being followed (checks commit history)

Dependency-Update-Tool + Vulnerabilities:

Automated updates prevent vulnerabilities from accumulating. Projects with active dependency updates score higher on Vulnerabilities check because known CVEs are patched faster.

Dependency-Update-Tool + Pinned-Dependencies:

Renovate auto-pins GitHub Actions to SHA digests, directly improving Pinned-Dependencies score. Dependabot does not pin by default.

Branch-Protection + Dangerous-Workflow:

Branch protection prevents attackers from merging malicious workflow changes directly. Requires PR review even for .github/workflows/*.yml files.

Branch-Protection + Maintained:

Active branch protection signals ongoing maintenance. Abandoned projects often have disabled or weakened branch protection.


Existing guides:

Blog posts:

Related patterns:

Comments