Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 0 additions & 2 deletions SECURITY.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,8 +31,6 @@ d. **[trivy](https://trivy.dev/latest/)**: Pre commit to GitHub scans Python dep

e. **[ox.security](https://www.ox.security/)**: Monitors dependencies for vulnerabilities pre and post release on GitHub.

How we handle vulnerabilities in our Python dependency supply chain — including the default path of raising lower bounds in `pyproject.toml`, and the list of advisories we have consciously accepted because no upstream fix is available yet — is documented in [SUPPLY_CHAIN_VULNERABILITIES.md](SUPPLY_CHAIN_VULNERABILITIES.md).

### 2. License Compliance Checks and Software Bill of Materials (SBOM)

a. **[pip-licenses](https://pypi.org/project/pip-licenses/)**: Inspects and matches the licenses of all dependencies with allow list to ensure compliance with licensing requirements and avoid using components with problematic licenses. `licenses.csv`, `licenses.json` and `licenses_grouped.json` published [per release](https://github.com/aignostics/python-sdk/releases).
Expand Down
132 changes: 0 additions & 132 deletions SUPPLY_CHAIN_VULNERABILITIES.md

This file was deleted.

3 changes: 0 additions & 3 deletions docs/partials/README_footer.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,6 @@
1. Inspect our
[security policy](https://aignostics.readthedocs.io/en/latest/security.html)
with detailed documentation of checks, tools and principles.
How we handle vulnerabilities in our Python dependency supply chain is
documented in
[SUPPLY_CHAIN_VULNERABILITIES.md](https://github.com/aignostics/python-sdk/blob/main/SUPPLY_CHAIN_VULNERABILITIES.md).
1. Inspect how we achieve
[operational excellence](https://aignostics.readthedocs.io/en/latest/operational_excellence.html)
with information on our modern toolchain and software architecture.
Expand Down
4 changes: 2 additions & 2 deletions noxfile.py
Original file line number Diff line number Diff line change
Expand Up @@ -146,8 +146,8 @@ def audit(session: nox.Session) -> None:
_setup_venv(session)

# pip-audit to check for vulnerabilities.
# Every --ignore-vuln entry must correspond to a row in SUPPLY_CHAIN_VULNERABILITIES.md
# with rationale, scope, downstream-exposure assessment, and removal condition.
# Every --ignore-vuln entry must be documented with rationale (inline comment below)
# explaining severity, scope, downstream-exposure assessment, and removal condition.
Comment on lines 148 to +150
try:
session.run(
"pip-audit",
Expand Down
2 changes: 1 addition & 1 deletion pyproject.toml
Original file line number Diff line number Diff line change
Expand Up @@ -125,7 +125,7 @@ dependencies = [
"urllib3>=2.6.3,<3", # CVE-2026-21441 requires >= 2.6.3
"wsidicom>=0.28.1,<1",
"fastmcp>=3.2.0,<4",
# Transitive overrides (see SUPPLY_CHAIN_VULNERABILITIES.md)
# Transitive overrides: lower bounds enforced to shield consumers from known CVEs/GHSAs.
# WARNING: one cannot negate or downgrade a dependency required here. use override-dependencies for that.
"rfc3987; sys_platform == 'never'", # GPLv3
"h11>=0.16.0", # CVE-2025-43859
Expand Down
Loading