Skip to content

ossf/tac

Repository files navigation

OpenSSF Technical Advisory Council (TAC)

The OpenSSF Technical Advisory Council is responsible for oversight of the various Technical Initiatives (TI) of the OpenSSF.

Get Involved

Although the TAC is composed of a set of official members listed below, any community member is welcome to participate in the TAC discussions.

Official communications occur on the TAC mailing list. Manage your subscriptions to Open SSF mailing lists.

Informal discussions occur in the TAC channel of the OpenSSF Slack. To join, use the following invite link.

Use GitHub Issues to request and discuss agenda items.

If you need support in any part of the process, please email operations@openssf.org.

Meetings

The TAC meetings minutes are online and appear on the OpenSSF Community Calendar.

Meetings are also recorded and posted to the OpenSSF YouTube channel.

TAC Members

Name Position Email Organization Term
Arnaud J Le Hors lehors@us.ibm.com IBM January 2024 - December 2025
Bob Callaway Vice Chair bcallaway@google.com Google January 2025 - December 2026
Michael Lieberman mike@kusari.dev Kusari January 2025 - December 2026
Zach Steindler Chair steiza@github.com GitHub January 2025 - December 2026
Marcela Melara marcela.melara@intel.com Intel January 2024 - December 2025
Jautau "Jay" White jaywhite@microsoft.com Microsoft January 2024 - December 2025
Stephen Augustus openssf@auggie.dev Bloomberg L.P. January 2025 - December 2025*
Georg Kunz georg.kunz@ericsson.com Ericsson January 2025 - December 2025*
Michael Scovetta michael.scovetta@microsoft.com Microsoft January 2025 - December 2025*

NOTE: *-marked entries denote TAC members appointed by the OpenSSF Governing Board; all other members are community-elected.

Charter

The TAC is chartered as part of the Open Source Security Foundation Charter.

Technical Initiatives

The governance of TIs is documented in the process section. This section provides you with all the information about the different types of initiatives and how they are managed, as well as how to propose a new initiative. It also covers the different levels of maturity a TI can be in, the requirements that must be met to move up to the next level, as well as the benefits that come with each level.

The following Technical Initiatives have been approved by the TAC. You may learn more about their status through their quarterly reports.

Working Groups (WGs)

Name Repository Notes Staff Contact Status
AI/ML Security GitHub Meeting Notes Jeff Diecks Incubating
Diversity, Equity, & Inclusion GitHub Meeting Notes Khahil White Incubating
Global Cyber Policy GitHub Meeting Notes Jeff Diecks & Kris Borchers Sandbox
Securing Critical Projects GitHub Meeting Notes Kris Borchers Incubating
Securing Software Repositories GitHub Meeting Notes Kris Borchers Graduated
Security Best Practices GitHub Meeting Notes David A. Wheeler Graduated
Security Tooling GitHub Meeting Notes Jeff Diecks Incubating
Supply Chain Integrity GitHub Meeting Notes Kris Borchers Incubating
Vulnerability Disclosures GitHub Meeting Notes Jeff Diecks Graduated

Projects

Name Repository Website Sponsoring Org Status
Best Practices Badge GitHub https://www.bestpractices.dev/ Best Practices WG TBD
Bomctl GitHub Security Tooling WG Sandbox
Criticality Score GitHub Securing Critical Projects WG TBD
Fuzz Introspector GitHub Security Tooling WG TBD
GUAC GitHub https://guac.sh Supply Chain Integrity WG Incubating
gittuf GitHub https://gittuf.dev/ Supply Chain Integrity WG Sandbox
OpenSSF Scorecard GitHub https://securityscorecards.dev/ Best Practices WG Incubating
OpenVEX GitHub Vulnerability Disclosures WG Sandbox
OSV Schema GitHub https://ossf.github.io/osv-schema/ Vulnerability Disclosures WG TBD
Minder GitHub Security Tooling WG Sandbox
Model signing GitHub AI/ML Security WG Sandbox
Package Analysis GitHub Securing Critical Projects WG TBD
Protobom GitHub Security Tooling WG Sandbox
Repository Service for TUF GitHub https://repository-service-tuf.readthedocs.io/ Securing Software Repositories WG Incubating
S2C2F GitHub Supply Chain Integrity WG Incubating
SBOMit GitHub Security Tooling WG Sandbox
Security Insights Spec GitHub Supply Chain Integrity WG TBD
Sigstore GitHub https://www.sigstore.dev/ OpenSSF TAC Graduated
SLSA GitHub https://slsa.dev/ Supply Chain Integrity WG TBD
Zarf GitHub https://zarf.dev/ Supply Chain Integrity WG Sandbox

OpenSSF affiliated projects

Name Repository Status
Core Toolchain Infrastructure https://git.coretoolchain.dev/ TBD
Alpha Omega https://github.com/ossf/alpha-omega TBD

Special Interest Groups (SIGs)

SIGs can be created and managed without formal approval from the TAC. The following is for information purpose only.

Name Repository/Home Page Governing Org
CVD Guides https://github.com/ossf/oss-vulnerability-guide Vulnerability Disclosures WG
OpenVEX https://github.com/ossf/OpenVEX Vulnerability Disclosures WG
Education https://github.com/ossf/education Best Practices WG
Memory Safety https://github.com/ossf/Memory-Safety Best Practices WG
C/C++ Compiler Options https://github.com/ossf/wg-best-practices-os-developers/tree/main/docs/Compiler-Hardening-Guides Best Practices WG
Python Hardening https://github.com/ossf/wg-best-practices-os-developers/tree/main/docs/Secure-Coding-Guide-for-Python Best Practices WG
Security Baseline https://github.com/ossf/security-baseline Best Practices WG
SBOM Everywhere https://github.com/ossf/sbom-everywhere Security Tooling WG
OSS Fuzzing https://github.com/ossf/wg-security-tooling?tab=readme-ov-file#oss-fuzzing-sig Security Tooling WG

Overview Diagrams

Diagrams with an overview of the OpenSSF, including its projects and SIGs, are available in the presentation OpenSSF Introduction (including Diagrammers’ Society diagrams) as created and maintained by the OpenSSF Diagrammer's Society.

Antitrust Policy

Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in, any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.

Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.