Skip to content

[StepSecurity] Apply security best practices#536

Open
stepsecurity-app[bot] wants to merge 1 commit intomainfrom
chore/GHA-052014-stepsecurity-remediation
Open

[StepSecurity] Apply security best practices#536
stepsecurity-app[bot] wants to merge 1 commit intomainfrom
chore/GHA-052014-stepsecurity-remediation

Conversation

@stepsecurity-app
Copy link
Contributor

This PR implements go/ssdlc-2. Please raise issues to ProdSec's on-call rotation.

Ref: https://github.com/chainguard-dev/prodsec/issues/138

Summary

This pull request has been generated by StepSecurity as part of your enterprise subscription to ensure compliance with recommended security best practices. Please review and merge the pull request to apply these security enhancements.

At a high level, this PR:

  • Adds the harden-runner Action if not already present
  • Pins Actions to a digest rather than mutable tags
  • Restricts GitHub token permissions to be as minimal as possible

Security Fixes

Pinned Dependencies

Pinning GitHub Actions to specific versions or commit SHAs ensures that your workflows remain consistent and secure.
Unpinned actions can lead to unexpected changes or vulnerabilities caused by upstream updates.

StepSecurity Maintained Actions

Risky GitHub Actions can expose your project to potential security risks. Risky actions have been replaced with StepSecurity maintained actions, that are secure drop-in replacements.

Feedback

For bug reports, feature requests, and general feedback; please create an issue in step-security/secure-repo or contact us via our website.

Signed-off-by: StepSecurity Bot <bot@stepsecurity.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants