{"id":44748746,"url":"https://github.com/tyhal/crie","last_synced_at":"2026-02-15T22:33:27.976Z","repository":{"id":37039334,"uuid":"168894029","full_name":"tyhal/crie","owner":"tyhal","description":"Universal meta-linter using containerized execution","archived":false,"fork":false,"pushed_at":"2026-02-09T14:54:25.000Z","size":1797,"stargazers_count":10,"open_issues_count":60,"forks_count":2,"subscribers_count":0,"default_branch":"main","last_synced_at":"2026-02-09T19:08:33.565Z","etag":null,"topics":["code-quality","containerization","developer-tools","docker","formatter","go","linter","podman","static-code-analysis"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/tyhal.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2019-02-03T00:34:58.000Z","updated_at":"2026-02-09T14:52:35.000Z","dependencies_parsed_at":"2023-10-03T04:31:16.296Z","dependency_job_id":"fece24d7-3e4d-4e3d-8d0b-d6c427912223","html_url":"https://github.com/tyhal/crie","commit_stats":null,"previous_names":[],"tags_count":26,"template":false,"template_full_name":null,"purl":"pkg:github/tyhal/crie","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tyhal%2Fcrie","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tyhal%2Fcrie/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tyhal%2Fcrie/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tyhal%2Fcrie/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/tyhal","download_url":"https://codeload.github.com/tyhal/crie/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tyhal%2Fcrie/sbom","scorecard":{"id":904769,"data":{"date":"2025-08-11","repo":{"name":"github.com/tyhal/crie","commit":"57aa35b9b692682a2b147ba6cc0fe96f9092da18"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4.9,"checks":[{"name":"Maintained","score":10,"reason":"30 commit(s) and 8 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Code-Review","score":0,"reason":"Found 0/5 approved changesets -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Info: jobLevel 'contents' permission set to 'read': .github/workflows/docker-push-template.yml:18","Warn: no topLevel permission defined: .github/workflows/crie.yml:1","Warn: no topLevel permission defined: .github/workflows/docker-build-template.yml:1","Warn: no topLevel permission defined: .github/workflows/docker-push-template.yml:1","Warn: no topLevel permission defined: .github/workflows/img-apk.yml:1","Warn: no topLevel permission defined: .github/workflows/img-go.yml:1","Warn: no topLevel permission defined: .github/workflows/img-npm.yml:1","Warn: no topLevel permission defined: .github/workflows/img-pip.yml:1","Warn: no topLevel permission defined: .github/workflows/release.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"CII-Best-Practices","score":2,"reason":"badge detected: InProgress","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: MIT License: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v0.20.1 not signed: https://api.github.com/repos/tyhal/crie/releases/232280746","Warn: release artifact v0.20.0 not signed: https://api.github.com/repos/tyhal/crie/releases/231927242","Warn: release artifact v0.20.1 does not have provenance: https://api.github.com/repos/tyhal/crie/releases/232280746","Warn: release artifact v0.20.0 does not have provenance: https://api.github.com/repos/tyhal/crie/releases/231927242"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":3,"reason":"branch protection is not maximal on development and all release branches","details":["Info: 'allow deletion' disabled on branch 'main'","Info: 'force pushes' disabled on branch 'main'","Info: 'branch protection settings apply to administrators' is required to merge on branch 'main'","Warn: 'stale review dismissal' is disabled on branch 'main'","Warn: branch 'main' does not require approvers","Warn: codeowners review is not required on branch 'main'","Warn: 'last push approval' is disabled on branch 'main'","Warn: no status checks found to merge onto branch 'main'","Info: PRs are required in order to make changes on branch 'main'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Packaging","score":10,"reason":"packaging workflow detected","details":["Info: Project packages its releases by way of GitHub Actions.: .github/workflows/release.yml:8"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"SAST","score":10,"reason":"SAST tool is run on all commits","details":["Info: all commits (30) are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/crie.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/crie.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/crie.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/crie.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/crie.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/crie.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-build-template.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/docker-build-template.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-build-template.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/docker-build-template.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-build-template.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/docker-build-template.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-push-template.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/docker-push-template.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-push-template.yml:35: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/docker-push-template.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-push-template.yml:40: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/docker-push-template.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-push-template.yml:43: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/docker-push-template.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-push-template.yml:46: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/docker-push-template.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/release.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/release.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/tyhal/crie/release.yml/main?enable=pin","Warn: containerImage not pinned by hash: img/apk/Dockerfile:1","Warn: containerImage not pinned by hash: img/apk/Dockerfile:5: pin your Docker image by updating alpine:3.22.1 to alpine:3.22.1@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: img/go/Dockerfile:1","Warn: containerImage not pinned by hash: img/go/Dockerfile:6","Warn: containerImage not pinned by hash: img/go/Dockerfile:14: pin your Docker image by updating alpine:3.22.1 to alpine:3.22.1@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: img/npm/Dockerfile:1: pin your Docker image by updating node:22-alpine3.22 to node:22-alpine3.22@sha256:1b2479dd35a99687d6638f5976fd235e26c5b37e8122f786fcd5fe231d63de5b","Warn: containerImage not pinned by hash: img/pip/Dockerfile:1: pin your Docker image by updating python:3-alpine3.22 to python:3-alpine3.22@sha256:a70b35b575e33d951e3f9d3fe94163ef0fd338c22552bc587a1b098a87ed6184","Warn: containerImage not pinned by hash: verify/lang/bash/Dockerfile:2: pin your Docker image by updating bash:5.3.3 to bash:5.3.3@sha256:cc444a5a327f8e42318b2772b392f8dd1a9dcb9e00d3c847cc9e419eefa20419","Warn: containerImage not pinned by hash: verify/lang/cpp/Dockerfile:2: pin your Docker image by updating gcc:15.2.0 to gcc:15.2.0@sha256:5f1bfa20b74a10ec6696bdf25a2ec444beedf3733a1b21b0dd74391133aa4f2b","Warn: containerImage not pinned by hash: verify/lang/go/Dockerfile:2: pin your Docker image by updating golang:1.25.0-alpine3.22 to golang:1.25.0-alpine3.22@sha256:f18a072054848d87a8077455f0ac8a25886f2397f88bfdd222d6fafbb5bba440","Warn: containerImage not pinned by hash: verify/lang/groovy/Dockerfile:2","Warn: containerImage not pinned by hash: verify/lang/haskell/Dockerfile:2: pin your Docker image by updating haskell:9.12.2 to haskell:9.12.2@sha256:20977637f012d31fa26fdb3640378dd5a09eac76a294924fdc977efb7613ed05","Warn: containerImage not pinned by hash: verify/lang/java/Dockerfile:2","Warn: containerImage not pinned by hash: verify/lang/javascript/Dockerfile:1: pin your Docker image by updating node:22.18.0 to node:22.18.0@sha256:3266bc9e8bee1acc8a77386eefaf574987d2729b8c5ec35b0dbd6ddbc40b0ce2","Warn: containerImage not pinned by hash: verify/lang/julia/Dockerfile:2: pin your Docker image by updating julia:1.11.6 to julia:1.11.6@sha256:584cb02c203791e0abdf7e8c060b6e33334c91c1fae493c85fde188eb1b39015","Warn: containerImage not pinned by hash: verify/lang/python/Dockerfile:2: pin your Docker image by updating python:3.13.7-alpine3.22 to python:3.13.7-alpine3.22@sha256:587df003ff48316a56a0ddac50e1e2b64dfeca281f0c071b91920895a65b12d2","Warn: containerImage not pinned by hash: verify/lang/r/Dockerfile:2: pin your Docker image by updating r-base:4.5.1 to r-base:4.5.1@sha256:c143ac223eff70f437c56f980ed582b4960dbb460a499b1d5119ff461a9f051b","Warn: goCommand not pinned by hash: img/go/Dockerfile:7","Warn: goCommand not pinned by hash: img/go/Dockerfile:9","Warn: goCommand not pinned by hash: img/go/Dockerfile:11","Warn: npmCommand not pinned by hash: img/npm/Dockerfile:6","Warn: npmCommand not pinned by hash: verify/lang/javascript/Dockerfile:4","Info:   0 out of   6 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   8 third-party GitHubAction dependencies pinned","Info:   0 out of  17 containerImage dependencies pinned","Info:   0 out of   3 goCommand dependencies pinned","Info:   0 out of   2 npmCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Vulnerabilities","score":7,"reason":"3 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2024-3042","Warn: Project is vulnerable to: GHSA-jpvw-p8pr-9g2x","Warn: Project is vulnerable to: PYSEC-2020-220"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-24T16:57:01.973Z","repository_id":37039334,"created_at":"2025-08-24T16:57:01.973Z","updated_at":"2025-08-24T16:57:01.973Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29490926,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-15T19:29:10.908Z","status":"ssl_error","status_checked_at":"2026-02-15T19:29:10.419Z","response_time":118,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["code-quality","containerization","developer-tools","docker","formatter","go","linter","podman","static-code-analysis"],"created_at":"2026-02-15T22:33:27.332Z","updated_at":"2026-02-15T22:33:27.965Z","avatar_url":"https://github.com/tyhal.png","language":"Go","readme":"\u003ch1 align=\"center\"\u003e\n    crie.\n\u003c/h1\u003e\n\u003cp align=\"center\"\u003e\n    universal meta-linter using containerized execution\n\u003c/p\u003e\n\u003cp align=\"center\"\u003e\n    \u003cimg src=\"doc/demo/demo.svg\" width=\"580\" alt=\"crie cli demo\"\u003e\n\u003c/p\u003e\n\n## Features\n\n#### This tool enables teams of developers to use static-analysis where they wouldn't:\n\n* No more config chaos - one simple setup for all your tools\n* Quality checks that just work, right out of the box\n* Container-based isolation for consistent tool execution\n* Container runtime flexibility - supports both Docker and Podman\n* Drop in and get coding - minimal setup required\n* Catch every blind spot with full coverage detection\n\n## Install\n\n```shell\n    brew install tyhal/tap/crie\n```\n\nfrom source:\n\n```shell\n    go install github.com/tyhal/crie/cmd/crie@latest\n```\n\n#### Deps\n\n* [Podman](https://podman.io/docs/installation) or [Docker](https://docs.docker.com/get-started/get-docker/)\n\n## Usage\n\nThe suggested way to start running crie is to run `chk` at the top of your project and add `--continue` to see every error in the project (this will not change any code)\n\n```bash\n    crie chk --continue\n```\n\n💡 Have ideas or ran into a bug? Open an issue — I’d love your feedback!\n\n## Documentation\n\nSee the **[documentation](doc/README.md)** for installation, configuration, and usage guides.\n\n***\n\n\u003cdiv align=\"center\"\u003e\n    \u003ca href=\"https://codecov.io/gh/tyhal/crie\"\u003e \n        \u003cimg alt=\"coverage\" src=\"https://codecov.io/gh/tyhal/crie/graph/badge.svg?token=SSAG0W1TZB\"/\u003e \n    \u003c/a\u003e\n\u003c/div\u003e\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftyhal%2Fcrie","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Ftyhal%2Fcrie","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftyhal%2Fcrie/lists"}