docs: gfi guidelines #1133
Merged
docs: gfi guidelines #1133
StepSecurity Actions Security / StepSecurity Harden-Runner
succeeded
Dec 18, 2025 in 12m 55s
No anomalous activity on CI/CD runners
No new Harden-Runner detections for this pull request.
Details
Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.
📋 Monitored GitHub Actions workflow runs
The following GitHub Actions workflow runs were monitored as part of this pull request.
| Workflow | Run ID | Unique Destinations | Actions Used | Detailed Insights |
|---|---|---|---|---|
| pr-check-title.yml | 20321554538 | 2 | 2 | View Insights |
| pr-check-test.yml | 20321472547 | 47 | 8 | View Insights |
| pr-check-examples.yml | 20321472527 | 41 | 8 | View Insights |
| pr-check-codecov.yml | 20321472525 | - | - | Harden-Runner not enabled |
| bot-verified-commits.yml | 20321472369 | 1 | 1 | View Insights |
| pr-check-title.yml | 20321472368 | 2 | 2 | View Insights |
| pr-check-changelog.yml | 20321472496 | 1 | 2 | View Insights |
| bot-merge-conflict.yml | 20321472366 | 1 | 1 | View Insights |
| bot-pr-auto-draft-on-changes.yml | 20334502906 | - | - | Harden-Runner not enabled |
📚 Learn More
You can learn more about this GitHub check here
Loading