Blog
Security Engineering

What OpenSSF Scorecard Hardening Looks Like for Agent Infrastructure

How CapFence approaches workflow pinning, least-privilege CI, and release governance.

Autonomous systems need deterministic execution controls, but the projects that ship those controls need the same rigor in their own supply chain.

CapFence treats CI as production infrastructure. Workflow actions are pinned, Python build dependencies are hash-locked, CodeQL runs on every change, and release paths are separated from ordinary validation. The practical goal is simple: make every automation step reviewable, repeatable, and constrained to the minimum permission it needs.

This is also why Scorecard work is not just a badge exercise. The checks expose operational drift: unreviewed merges, broad workflow tokens, unsigned releases, and missing fuzz targets. Each one maps to a concrete trust boundary in the software delivery path.