GitHub Workflow Flaw: OpenVEX Security Artifacts Contain Placeholder CVE, Misleading Downstream Consumers
A critical discrepancy in a GitHub repository's security automation undermines the integrity of its software supply chain. The project's SECURITY.md file claims it generates OpenVEX artifacts—machine-readable security advisories—during its release workflow. However, the actual artifact shipped is a static template containing a synthetic placeholder for a non-existent vulnerability, `CVE-0000-0000`. This results in a meaningless assertion that the release is "not affected" by a fictional CVE, providing no real security posture data to downstream consumers and potentially creating a false sense of security.
The flaw is rooted in the workflow's implementation. The file `openvex.template.json` contains placeholder text explicitly labeled as a template. The release automation, defined in `.github/workflows/changesets-release.yml`, only performs basic string substitutions for metadata like repository name and timestamp. It does not integrate with any real vulnerability data sources, such as `pnpm audit`, `osv-scanner`, or the GitHub Advisory Database, to generate assertions based on actual advisories relevant to the release.
This gap creates a tangible threat scenario. Automated downstream systems or security teams that programmatically ingest these OpenVEX artifacts for compliance or risk assessment receive operationally useless data. The artifact fails to communicate whether the release is affected by any real, known vulnerabilities, breaking the trust and transparency expected from a security-focused software supply chain. The issue highlights a systemic risk where security documentation promises are not backed by functional automation, leaving a critical data void for consumers.