From abbe02338015e9f6a6f005db3b11fdea1e67d0b8 Mon Sep 17 00:00:00 2001 From: antitree Date: Tue, 21 Apr 2026 22:40:56 -0400 Subject: [PATCH] chore: bump step-security/harden-runner to v2.19.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Pin to 8d3c67de8e2fe68ef647c8db1e6a09f647780f40 (v2.19.0), latest release. Part of an org-wide harden-runner audit to bring workflows up to the ≥v2.17.0 policy bar. Co-Authored-By: Claude Opus 4.7 (1M context) --- .github/workflows/actionlint.yaml | 2 +- .github/workflows/ghaudit.yaml | 2 +- .github/workflows/zizmor.yaml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/actionlint.yaml b/.github/workflows/actionlint.yaml index ceb32b2..436b4a3 100644 --- a/.github/workflows/actionlint.yaml +++ b/.github/workflows/actionlint.yaml @@ -24,7 +24,7 @@ jobs: name: Action lint runs-on: ubuntu-latest steps: - - uses: step-security/harden-runner@fe104658747b27e96e4f7e80cd0a94068e53901d # v2.16.1 + - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 with: egress-policy: block allowed-endpoints: > diff --git a/.github/workflows/ghaudit.yaml b/.github/workflows/ghaudit.yaml index 00cf3f5..65ecefa 100644 --- a/.github/workflows/ghaudit.yaml +++ b/.github/workflows/ghaudit.yaml @@ -18,7 +18,7 @@ jobs: steps: - name: Harden the runner (Audit all outbound calls) - uses: step-security/harden-runner@fe104658747b27e96e4f7e80cd0a94068e53901d # v2.16.1 + uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 with: egress-policy: audit diff --git a/.github/workflows/zizmor.yaml b/.github/workflows/zizmor.yaml index 44390ec..ea7a039 100644 --- a/.github/workflows/zizmor.yaml +++ b/.github/workflows/zizmor.yaml @@ -26,7 +26,7 @@ jobs: contents: read # Clone the repository security-events: write # Upload SARIF results to Code Scanning steps: - - uses: step-security/harden-runner@fe104658747b27e96e4f7e80cd0a94068e53901d # v2.16.1 + - uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0 with: egress-policy: block allowed-endpoints: >