Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [open-regulatory-compliance] Kicking off the CRA Attestations project

Hey all,

First of all, a big thanks to Æva for getting this off the ground!

I saw Mathias's message and as a former lawmaker who worked on the CRA, I thought I'd chime in.
 
1. Regarding the due diligence obligations under Article 13(5), is the list of actions in Recital 34—such as checking conformity, reviewing update history, and scanning vulnerability databases—generally understood to represent the typical scope of a manufacturer's duty?

Due Diligence is not clearly defined in EU law because the level of diligence depends on the situation. As a rule of thumb, within Parliament's legal affairs committee, we always considered that the adequate level of diligence is one that ensures the goals of the regulation are met.

It's also important to note that while recitals do provide context to support interpretation, they are not exhaustive. In my view, for some products, in particularly in lower-risk uses and for very popular libraries, they may suffice. However for higher risk products or use cases, in my view they are inadequate. The law creates Security attestations to address this problem (at least, that was the logic when it was written!)

I also think that we cannot afford to ignore consequences and issues that arise because of the CRA outside the framework of the CRA itself: for example, Liability under the Product Liability Directive, and insurance related to that Liability. As I see it the current wording of the PLD, and hence the position of insurers, will also be that what is in Recital 34 is not enough, especially in high risk use cases.

2.  Given that a manufacturer can always fulfill their Article 13(5) due diligence by conducting an internal assessment or by commissioning a private one from any third party, what is the justification for proposing to limit who gets to issue attestations under Article 25? This refers both to the proposals I heard in the room allowing an open source project to select who gets to issue article 25 attestations or limiting it to - for example - stewards.

The CRA is as much an Open Source Sustainability law as it is a Cyber Resilience one, but Open Source Sustainability is vital to Cyber resilience. If we do not limit who can issue attestations, we will find ourself in a situation where dozens of companies pop up whose entire mission is to harass Open Source developers into providing them enough information to create an attestation, and then pocket the cash.That is an unacceptable but extremely likely outcome if we don't create some restrictions.

I also believe that allowing organisations with no affiliation or link with the developers to provide attestations would not result in those attestations being reliable or valuable.

You are right that companies can conduct internal assessments or commission private assessments from a third-party, however that, in my view, would likely involve in-depth auditing of code (to meet the requirements of insurance companies), which will be extremely costly, and again, those third parties do not necessarily have the information required to attest to the security of the supply chain.

This makes attestations the better choice for manufacturers.

3. Is an attestation issued as a voluntary security attestation under an article 25 system bound to the software alone or *also* to the recipient? For instance, if Manufacturer A gets an attestation for libfoo 0.9.6c, can Manufacturer B, who uses the exact same component, also use that attestation for their own due diligence (assuming for the purpose of this question that B learned of the existence of this attestation)? If the answer is 'no, it's recipient-bound,' could you help me understand what law or rule creates that restriction?

It could be either. Attestations in their own right could just be a contractual relationship between the attestor and the manufacturer, not a document or object. It's also worth noting that the EU can write implementing regulations and delegated acts which set out such a system for the purposes of the CRA.

I hope these responses are useful!

Best Regards,
--
Jordan Maris
EU Policy Analyst, The Open Source Initiative
tel: +33613141427


On Thu, Oct 23, 2025 at 4:17 PM Mathias Schindler via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx> wrote:
Hi everyone,

I would like to express my most sincere appreciation for Æva for preparing, organizing and running the workshop (and to everyone for making code&compliance possible).

The workshop on voluntary security attestations have left me with three questions to which no consensus on the factual basis exists. I have opinions on them and I try to phrase the question in a neutral manner (My apologies if I failed):

1. Regarding the due diligence obligations under Article 13(5), is the list of actions in Recital 34—such as checking conformity, reviewing update history, and scanning vulnerability databases—generally understood to represent the typical scope of a manufacturer's duty?

2.  Given that a manufacturer can always fulfill their Article 13(5) due diligence by conducting an internal assessment or by commissioning a private one from any third party, what is the justification for proposing to limit who gets to issue attestations under Article 25? This refers both to the proposals I heard in the room allowing an open source project to select who gets to issue article 25 attestations or limiting it to - for example - stewards.

3. Is an attestation issued as a voluntary security attestation under an article 25 system bound to the software alone or *also* to the recipient? For instance, if Manufacturer A gets an attestation for libfoo 0.9.6c, can Manufacturer B, who uses the exact same component, also use that attestation for their own due diligence (assuming for the purpose of this question that B learned of the existence of this attestation)? If the answer is 'no, it's recipient-bound,' could you help me understand what law or rule creates that restriction?

I am asking these questions because I got to understand over the course of the workshop that the answer to these questions has very dramatic effects on how many of the finer topics were discussed or could be designed. And also I do not have a position set in stone on these questions, I am still in the deliberation phase.

To everyone not home to Brussels, have a safe trip home and I would love to see you again,
Mathias

On Mon, Oct 20, 2025 at 11:57 PM aeva.black--- via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx> wrote:
Dear community,

I am pleased to announce the creation of the CRA Attestations project and our first meeting tomorrow, Tuesday October 21st, at 16:00 CEST / 14:00 UTC.

The meeting will be held via Jitsi: https://meet.jit.si/MainHeadquartersDismissWell

Kickoff agenda will loosely cover three topics:
- Project goals
- Contributing guidelines
- Agenda for the Code & Compliance Workshop on Thursday


Best regards,
--Æva

_______________________________________________
open-regulatory-compliance mailing list
open-regulatory-compliance@xxxxxxxxxxx
To unsubscribe from this list, visit https://accounts.eclipse.org
_______________________________________________
open-regulatory-compliance mailing list
open-regulatory-compliance@xxxxxxxxxxx
To unsubscribe from this list, visit https://accounts.eclipse.org

Back to the top