Skip to main content
Package policies define the criteria Turen uses to evaluate package installations. When an AI agent attempts to install a package, Turen evaluates it against your policies and either allows, flags for review, or blocks the installation.

Default Thresholds

PolicyDefault ValueDescription
Minimum Scorecard5.0Packages with an OpenSSF Scorecard below this score are blocked
Review Scorecard8.0Packages scoring between min and this value are flagged for review
Max Known Vulnerabilities5Block packages with more than this many known CVEs
Block on Critical VulnerabilityEnabledImmediately block packages with critical-severity CVEs
Require ProvenanceDisabledRequire SLSA provenance for packages
Allow Provenance FallbackEnabledAllow installation if provenance can’t be verified
Review New Packages30 daysFlag packages published less than 30 days ago

Adjusting Thresholds

Navigate to the policy configuration in the dashboard to modify these values. Example: Stricter thresholds for a security-conscious team:
PolicyValue
Minimum Scorecard7.0
Review Scorecard9.0
Max Known Vulnerabilities0
Block on Critical VulnerabilityEnabled
Review New Packages90 days
Example: Relaxed thresholds for a rapid prototyping team:
PolicyValue
Minimum Scorecard3.0
Review Scorecard6.0
Max Known Vulnerabilities10
Review New Packages7 days

Ecosystem-Specific Policies

You can set different thresholds per package ecosystem:
  • npm — Node.js packages
  • pip — Python packages
  • go — Go modules
  • cargo — Rust crates
This is useful when risk tolerances vary by language or project type.

License Policies

Control which open-source licenses are acceptable:
  • Allowed licenses — Explicitly permit specific licenses (e.g., MIT, Apache-2.0, BSD)
  • Blocked licenses — Block packages with specific licenses (e.g., AGPL, SSPL)
Packages with licenses not on either list are flagged for review.

How Evaluation Works

When a package install is requested:
1

Scorecard check

The package’s OpenSSF Scorecard score is compared against your thresholds.
2

Vulnerability scan

Known CVEs are checked against your maximum vulnerability count and critical vulnerability policy.
3

License check

The package’s license is compared against your allowed/blocked lists.
4

Age check

If the package was published recently, it may be flagged for review.
5

Decision

Based on all checks, the package is allowed, flagged for review, or blocked. The decision and reasoning are logged.