Is there a Plugin Portal policy over publications ?
For example… Getting a generic JVM project published at Sonatype OSS used to require the source code be published and the OSS repository performed the automated build of the source, and it was the output artifacts that were then published. This provides audit ability of original project sources, and sources must be presented to make a publication of an OSS project. This policy from maybe a decade ago seems a good thing even before modern security concerns in this area. They may also provide signed artifacts by default in their process.
Does such a policy exist for Gradle Plugin Portal (or at least) the ability to classify (add a sticker, and promote higher ranking, provide filter) projects that have a binary verified sources ? Like a blue-tick style setting for a project, that the portal has performed an extra validation step.
Secondly if I look around the plugin portal, I can clearly see more than one project claim the source repository is the same upstream project, it claims to be a newer version that doesn’t actually existed as a release or tag or branch within that (victim?) target project. So this should also be an additional classification that the github account (or similar) is claimed by the publishing entity that is publishing the GPP entry.
At this stage I am not claiming there is anything concerning or problematic with the additional plugin projects. That would require some kind of bytecode/binary project analysis, however I am concerned they are given as much weight in the published listings as the original, and then appear above (due to newer release date) than the original.
There is also no button within the Gradle Plugin Portal UI to report a concern of this nature even if a concern was found to exist.
Seems very open to security concerns.
Is it possible to publish my Gradle Plugin only from such a verified system (like Sonatype OSS facilities, that build from source and signed the resulting published artifacts, to provide a minimum standard in chain of trust, you have the exact source made available along side the published binary plugin to begin a security validation).
My plugin is an OSS non-commercial effort, so no commercial funding is available to attribute to this area, as this if in effect an enrichment to the Gradle ecosystem that helps Gradle commercial offering and not myself, it seems better to continue to publish only from GHA since at least there is a chain of trust over there when publishing out of an action.