Skip to content

Diátaxis: Security: General considerations#2801

Open
mgorny wants to merge 5 commits intoconda-forge:mainfrom
mgorny:expl-security
Open

Diátaxis: Security: General considerations#2801
mgorny wants to merge 5 commits intoconda-forge:mainfrom
mgorny:expl-security

Conversation

@mgorny
Copy link
Copy Markdown
Contributor

@mgorny mgorny commented Apr 7, 2026

PR Checklist:

  • note any issues closed by this PR with closing keywords
  • if you are adding a new page under docs/ or community/, you have added it to the sidebar in the corresponding _sidebar.json file
  • put any other relevant information below

Fixes Quansight-Labs/conda-ecosystem-sta-mgmt#77

mgorny added 2 commits April 7, 2026 19:04
Signed-off-by: Michał Górny <mgorny@quansight.com>
Update, make the language a bit more formal.  Note that in v1 recipes
we're also protecting against downloading during build.  Remove obsolete
`artifact-validation` link (TODO: do we still do that?).

Signed-off-by: Michał Górny <mgorny@quansight.com>
@mgorny mgorny requested a review from a team as a code owner April 7, 2026 18:02
@netlify
Copy link
Copy Markdown

netlify bot commented Apr 7, 2026

Deploy Preview for conda-forge-previews ready!

Name Link
🔨 Latest commit 6733c4b
🔍 Latest deploy log https://app.netlify.com/projects/conda-forge-previews/deploys/69d92a40ac37f50008de284c
😎 Deploy Preview https://deploy-preview-2801--conda-forge-previews.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.
Lighthouse
Lighthouse
1 paths audited
Performance: 80
Accessibility: 96
Best Practices: 100
SEO: 89
PWA: -
View the detailed breakdown and full score reports

To edit notification comments on pull requests, go to your Netlify project configuration.

This is enforced by using a cf-staging channel where builds are first sent.
A bot then assesses that the submitting feedstock has permission to build the package it has submitted, and only then will it relay the build to the `conda-forge` channel.
This helps mitigate against a bad actor gaining access to an inconspicuous feedstock and then trying to push a build with malicious code into essential infrastructure packages (e.g., OpenSSL or Python).
5. Conda-forge artifacts uploaded to `anaconda.org` are scanned for various security-related issues, such as artifacts that overwrite key pieces of certain packages.
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see that the artifact-validation repo has been archived, and I couldn't find anything clearly resembling what's described here. That said, this is quite vague, so I think we should replace it with something more specific. I'd appreciate pointers.

Comment on lines +27 to +28
If you have found a security-related issue with conda-forge, please check our [Security Policy](https://github.com/conda-forge/conda-forge.github.io/security/policy)
to learn how to report it responsibly.
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we mention here explicitly that this is only for conda-forge stuff and not feedstocks?

mgorny added 3 commits April 7, 2026 20:48
Signed-off-by: Michał Górny <mgorny@quansight.com>
So far I wasn't able to find any code beyond what was already stated --
i.e. allowlisting outputs.

Signed-off-by: Michał Górny <mgorny@quansight.com>
Signed-off-by: Michał Górny <mgorny@quansight.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Diátaxis: Explanations - Security - General considerations

1 participant