rigscore v0.8.0
Changes: v0.7.2 â v0.8.0
Two new checks, a distribution model change, and release automation fixes.
| Change | What it does |
|---|---|
infrastructure-security check | Scans Terraform, Pulumi, and raw cloud config for public-by-default resources, missing encryption, and overly-permissive IAM |
site-security check | Scans static-site configs (Hugo, Jekyll, Next.js) for exposed build artifacts, secrets in public/, and source-map leaks |
| Drop npm distribution | Single channel â npx github:Back-Road-Creative/rigscore. No npm account required, fewer supply-chain surfaces |
| Release workflow consolidation | One release.yml drives tag, GitHub release, headlessmode journal post, and tool-page sync |
workflow_dispatch on release | Manual re-trigger now possible when a release run fails mid-flight |
Infrastructure-security check
rigscore started as an AI-dev hygiene tool â governance files, skill files, MCP configs. v0.8.0 extends the hygiene model to the infrastructure that hosts those agents. The new infrastructure-security check scans for the most common same-day misconfigurations:
- Public S3 buckets, GCS buckets, and Azure storage accounts declared without private-access flags
- RDS / Cloud SQL / Azure DB instances without encryption-at-rest
- IAM policies that grant
*on*to non-root principals - Terraform state files committed to the repo (a classic secret-leak vector)
The check is weighted 6 points â same as docker-security â and slots into the hygiene side of the scoring model.
Site-security check
Static sites are a surprisingly rich leak surface. Build tools routinely copy everything in content/ or pages/ into public/ â including the .env that was sitting in the repo root, the source maps that leak your TypeScript, and the draft pages with unreleased announcements. The new site-security check looks at the common static-site frameworks and flags:
.env*files insidepublic/,static/,dist/, orbuild/- Source-map files (
*.map) shipped to production - Draft content without a
draft: trueflag that still ships on build config.toml/_config.ymlwithbuildDrafts = trueor equivalent- Known analytics or admin keys embedded in client-visible config
Like infrastructure-security, this slots into the hygiene side at 6 points.
npm dropped â GitHub only
rigscore was briefly published to npm. It isn’t anymore. The distribution surface is now a single path:
| |
Two reasons. First, the npm account adds a supply-chain surface (2FA reset attacks, account takeovers) that a scoring tool built to warn you about supply-chain attacks shouldn’t introduce. Second, the github: protocol pins to a tag or branch â users can audit exactly what they’re running without an opaque registry indirection.
The npm install -g rigscore path is gone. No migration: change rigscore to npx github:Back-Road-Creative/rigscore in your CI and local shell.
Release plumbing
The v0.8.0 release cycle exposed a handful of CI gaps. Three fixes landed:
release.ymlconsolidated from two overlapping workflows into oneworkflow_dispatchadded so a failed release can be re-run manually without retagging- Git log sourcing for the auto-generated headlessmode journal post fixed â previous releases published with empty commit tables
Run it
| |
No accounts, no telemetry, no network calls. MIT licensed.