Skip to content

Commit 59506a2

Browse files
olivermeyerclaude
andcommitted
docs: revert supply-chain vulnerability documentation from #580
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent 48eda3d commit 59506a2

5 files changed

Lines changed: 3 additions & 140 deletions

File tree

SECURITY.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,6 @@ d. **[trivy](https://trivy.dev/latest/)**: Pre commit to GitHub scans Python dep
3131

3232
e. **[ox.security](https://www.ox.security/)**: Monitors dependencies for vulnerabilities pre and post release on GitHub.
3333

34-
How we handle vulnerabilities in our Python dependency supply chain — including the default path of raising lower bounds in `pyproject.toml`, and the list of advisories we have consciously accepted because no upstream fix is available yet — is documented in [SUPPLY_CHAIN_VULNERABILITIES.md](SUPPLY_CHAIN_VULNERABILITIES.md).
35-
3634
### 2. License Compliance Checks and Software Bill of Materials (SBOM)
3735

3836
a. **[pip-licenses](https://pypi.org/project/pip-licenses/)**: Inspects and matches the licenses of all dependencies with allow list to ensure compliance with licensing requirements and avoid using components with problematic licenses. `licenses.csv`, `licenses.json` and `licenses_grouped.json` published [per release](https://github.com/aignostics/python-sdk/releases).

SUPPLY_CHAIN_VULNERABILITIES.md

Lines changed: 0 additions & 132 deletions
This file was deleted.

docs/partials/README_footer.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,6 @@
33
1. Inspect our
44
[security policy](https://aignostics.readthedocs.io/en/latest/security.html)
55
with detailed documentation of checks, tools and principles.
6-
How we handle vulnerabilities in our Python dependency supply chain is
7-
documented in
8-
[SUPPLY_CHAIN_VULNERABILITIES.md](https://github.com/aignostics/python-sdk/blob/main/SUPPLY_CHAIN_VULNERABILITIES.md).
96
1. Inspect how we achieve
107
[operational excellence](https://aignostics.readthedocs.io/en/latest/operational_excellence.html)
118
with information on our modern toolchain and software architecture.

noxfile.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,8 +146,8 @@ def audit(session: nox.Session) -> None:
146146
_setup_venv(session)
147147

148148
# pip-audit to check for vulnerabilities.
149-
# Every --ignore-vuln entry must correspond to a row in SUPPLY_CHAIN_VULNERABILITIES.md
150-
# with rationale, scope, downstream-exposure assessment, and removal condition.
149+
# Every --ignore-vuln entry must be documented with rationale (inline comment below)
150+
# explaining severity, scope, downstream-exposure assessment, and removal condition.
151151
try:
152152
session.run(
153153
"pip-audit",

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ dependencies = [
125125
"urllib3>=2.6.3,<3", # CVE-2026-21441 requires >= 2.6.3
126126
"wsidicom>=0.28.1,<1",
127127
"fastmcp>=3.2.0,<4",
128-
# Transitive overrides (see SUPPLY_CHAIN_VULNERABILITIES.md)
128+
# Transitive overrides: lower bounds enforced to shield consumers from known CVEs/GHSAs.
129129
# WARNING: one cannot negate or downgrade a dependency required here. use override-dependencies for that.
130130
"rfc3987; sys_platform == 'never'", # GPLv3
131131
"h11>=0.16.0", # CVE-2025-43859

0 commit comments

Comments
 (0)