Skip to content

Commit ee3b1dd

Browse files
Merge pull request #1901 from step-security/rename-secure-repo
Update README for rename to secure-repo
2 parents 4d658b8 + 0aded86 commit ee3b1dd

File tree

3 files changed

+31
-33
lines changed

3 files changed

+31
-33
lines changed

README.md

Lines changed: 21 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,15 @@
1-
<p align="center"><img src="images/banner.png" height="80" /></p>
2-
3-
<h1 align="center">Secure Workflows</h1>
1+
<p align="center"><img src="images/banner1.png" height="80" /></p>
42

53
<p align="center">
6-
Secure GitHub Actions CI/CD workflows via automated remediations
4+
Secure your GitHub repo with ease through automated security fixes
75
</p>
86

97
<div align="center">
108

11-
[![Maintained by stepsecurity.io](https://img.shields.io/badge/maintained%20by-stepsecurity.io-blueviolet)](https://stepsecurity.io/?utm_source=github&utm_medium=organic_oss&utm_campaign=secure-workflows)
12-
[![Go Report Card](https://goreportcard.com/badge/github.com/step-security/secure-workflows)](https://goreportcard.com/report/github.com/step-security/secure-workflows)
13-
[![codecov](https://codecov.io/gh/step-security/secure-workflows/branch/main/graph/badge.svg?token=02ONA6U92A)](https://codecov.io/gh/step-security/secure-workflows)
14-
[![OpenSSF Scorecard](https://api.securityscorecards.dev/projects/github.com/step-security/secure-workflows/badge)](https://api.securityscorecards.dev/projects/github.com/step-security/secure-workflows)
9+
[![Maintained by stepsecurity.io](https://img.shields.io/badge/maintained%20by-stepsecurity.io-blueviolet)](https://stepsecurity.io/?utm_source=github&utm_medium=organic_oss&utm_campaign=secure-repo)
10+
[![Go Report Card](https://goreportcard.com/badge/github.com/step-security/secure-repo)](https://goreportcard.com/report/github.com/step-security/secure-repo)
11+
[![codecov](https://codecov.io/gh/step-security/secure-repo/branch/main/graph/badge.svg?token=02ONA6U92A)](https://codecov.io/gh/step-security/secure-repo)
12+
[![OpenSSF Scorecard](https://api.securityscorecards.dev/projects/github.com/step-security/secure-repo/badge)](https://api.securityscorecards.dev/projects/github.com/step-security/secure-repo)
1513

1614
</div>
1715

@@ -31,7 +29,7 @@ Secure GitHub Actions CI/CD workflows via automated remediations
3129

3230
### Hosted Instance: [app.stepsecurity.io/securerepo](https://app.stepsecurity.io/securerepo)
3331

34-
To secure GitHub Actions workflows using a pull request:
32+
To secure your GitHub repo using a pull request:
3533

3634
- Go to https://app.stepsecurity.io/securerepo and enter your public GitHub repository
3735
- Log in using your GitHub Account (no need to install any App or grant `write` access)
@@ -44,7 +42,7 @@ To secure GitHub Actions workflows using a pull request:
4442
- Follow the remediation tip that points to https://app.stepsecurity.io
4543

4644
<p align="center">
47-
<img src="images/SecureWorkflowsIntegration.png" alt="Secure workflow Scorecard integration screenshot" width="600">
45+
<img src="images/SecureWorkflowsIntegration.png" alt="Secure repo Scorecard integration screenshot" width="600">
4846
</p>
4947

5048
### Self Hosted
@@ -75,11 +73,11 @@ In this pull request, minimum permissions are set automatically for the GITHUB_T
7573

7674
<p align="center"><img src="images/token-perm-example.png" alt="Screenshot of token permissions set in a workflow" width="600" /></p>
7775

78-
#### How does SecureWorkflows fix this issue?
76+
#### How does Secure-Repo fix this issue?
7977

80-
- SecureWorkflows stores the permissions needed by different GitHub Actions in a [knowledge base](<(https://github.com/step-security/secure-workflows/tree/main/knowledge-base/actions)>)
78+
- Secure-Repo stores the permissions needed by different GitHub Actions in a [knowledge base](<(https://github.com/step-security/secure-repo/tree/main/knowledge-base/actions)>)
8179
- It looks up the permissions needed by each Action in your workflow and sums the permissions up to come up with a final recommendation
82-
- If you are the owner of a GitHub Action, please [contribute to the knowledge base](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/README.md)
80+
- If you are the owner of a GitHub Action, please [contribute to the knowledge base](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/README.md)
8381

8482
### 2. Pin Actions to a full length commit SHA
8583

@@ -93,17 +91,17 @@ In this pull request, minimum permissions are set automatically for the GITHUB_T
9391

9492
Before the fix, your workflow may look like this (use of `v1` and `latest` tags)
9593

96-
After the fix, SecureWorkflows pins each Action and docker image to an immutable checksum.
94+
After the fix, Secure-Repo pins each Action and docker image to an immutable checksum.
9795

9896
**Pull request example**: https://github.com/electron/electron/pull/36343
9997

10098
In this pull request, the workflow file has the GitHub Actions tags pinned automatically to their full-length commit SHA.
10199

102100
<p align="center"><img src="images/pin-example.png" alt="Screenshot of Action pinned to commit SHA" width="600" /></p>
103101

104-
#### How does SecureWorkflows fix this issue?
102+
#### How does Secure-Repo fix this issue?
105103

106-
- SecureWorkflows automates the process of getting the commit SHA for each mutable Action version or Docker image tag
104+
- Secure-Repo automates the process of getting the commit SHA for each mutable Action version or Docker image tag
107105
- It does this by using GitHub and Docker registry APIs
108106

109107
### 3. Add Harden-Runner GitHub Action to each job
@@ -120,9 +118,9 @@ This pull request adds the Harden Runner GitHub Action to the workflow file.
120118

121119
<p align="center"><img src="images/harden-runner-example.png" width="600" alt="Screenshot of Harden-Runner GitHub Action added to a workflow" /></p>
122120

123-
#### How does SecureWorkflows fix this issue?
121+
#### How does Secure-Repo fix this issue?
124122

125-
SecureWorkflows updates the YAML file and adds [Harden-Runner GitHub Action](https://github.com/step-security/harden-runner) as the first step to each job.
123+
Secure-Repo updates the YAML file and adds [Harden-Runner GitHub Action](https://github.com/step-security/harden-runner) as the first step to each job.
126124

127125
### 4. Add or update Dependabot configuration
128126

@@ -143,9 +141,9 @@ This pull request updates the Dependabot configuration.
143141

144142
<p align="center"><img src="images/dependabot-example.png" width="600" alt="Screenshot of Dependabot config updated" /></p>
145143

146-
#### How does SecureWorkflows fix this issue?
144+
#### How does Secure-Repo fix this issue?
147145

148-
SecureWorkflows updates the `dependabot.yml` file to add missing ecosystems. For example, if the Dependabot configuration updates npm packages but not GitHub Actions, it is updated to add the GitHub Actions ecosystem.
146+
Secure-Repo updates the `dependabot.yml` file to add missing ecosystems. For example, if the Dependabot configuration updates npm packages but not GitHub Actions, it is updated to add the GitHub Actions ecosystem.
149147

150148
### 5. Add CodeQL workflow (SAST)
151149

@@ -163,12 +161,12 @@ After the fix, a `codeql.yml` GitHub Actions workflow gets added to your project
163161

164162
This pull request adds CodeQL to the list of workflows.
165163

166-
#### How does SecureWorkflows fix this issue?
164+
#### How does Secure-Repo fix this issue?
167165

168-
SecureWorkflows has a [workflow-templates](https://github.com/step-security/secure-workflows/tree/main/workflow-templates) folder. This folder has the default CodeQL workflow, which gets added as part of the pull request. The placeholder for languages in the template gets replaced with languages for your GitHub repository.
166+
Secure-Repo has a [workflow-templates](https://github.com/step-security/secure-repo/tree/main/workflow-templates) folder. This folder has the default CodeQL workflow, which gets added as part of the pull request. The placeholder for languages in the template gets replaced with languages for your GitHub repository.
169167

170168
## Contributing
171169

172170
Contributions are welcome!
173171

174-
If you are the owner of a GitHub Action, please contribute information about the use of GITHUB_TOKEN for your Action. This will enable the community to automatically calculate minimum token permissions for the GITHUB_TOKEN for their workflows. Check out the [Contributing Guide](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/README.md)
172+
If you are the owner of a GitHub Action, please contribute information about the use of GITHUB_TOKEN for your Action. This will enable the community to automatically calculate minimum token permissions for the GITHUB_TOKEN for their workflows. Check out the [Contributing Guide](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/README.md)

images/banner1.png

12.7 KB
Loading

knowledge-base/actions/README.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ If you are the owner of a GitHub Action, please contribute information about the
66

77
To contribute information about the use of `GITHUB_TOKEN` for your Action:
88

9-
1. Add a folder for your GitHub Action under the [`knowledge-base/actions`](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/) folder. It should match the path of your GitHub Action's `action.yml` file. As an example,
9+
1. Add a folder for your GitHub Action under the [`knowledge-base/actions`](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/) folder. It should match the path of your GitHub Action's `action.yml` file. As an example,
1010
- If your GitHub Action's `action.yml` file is at the root, e.g. https://github.com/stelligent/cfn_nag/blob/master/action.yml, the path should be `knowledge-base/actions/stelligent/cfn_nag`
1111
- If your GitHub Action's `action.yml` file is in a sub folder, e.g. at https://github.com/snyk/actions/blob/master/gradle/action.yml, the path should be `knowledge-base/actions/snyk/actions/gradle`
1212
2. In the folder for your GitHub Action, add an `action-security.yml` file.
@@ -19,7 +19,7 @@ For this scenario,
1919
1. Add a `name` attribute in your `action-security.yml` file. You can set the name to be same as the name in your `action.yml` file.
2020
2. In a comment just mention that the GitHub token is not used.
2121

22-
Here is an [example](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/stelligent/cfn_nag/action-security.yml).
22+
Here is an [example](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/stelligent/cfn_nag/action-security.yml).
2323

2424
``` yaml
2525
name: 'Stelligent cfn_nag' # stelligent/cfn_nag
@@ -33,13 +33,13 @@ Note: if your Action just uses `metadata` permission to overcome throttle limits
3333
For this scenario, follow these steps:
3434
1. Add a `name` attribute in your `action-security.yml` file. You can set the name to be same as the name in your `action.yml` file.
3535
2. Mention where you expect the GitHub token.
36-
- If you expect it as an environment variable, you specify it this way. Here is an [example](https://github.com/step-security/secure-workflows/blob/00c05310c1c97a91b98c46f904e857a617a2fc02/knowledge-base/actions/dev-drprasad/delete-tag-and-release/action-security.yml):
36+
- If you expect it as an environment variable, you specify it this way. Here is an [example](https://github.com/step-security/secure-repo/blob/00c05310c1c97a91b98c46f904e857a617a2fc02/knowledge-base/actions/dev-drprasad/delete-tag-and-release/action-security.yml):
3737
``` yaml
3838
name: Delete tag and release
3939
github-token:
4040
environment-variable-name: GITHUB_TOKEN
4141
```
42-
- If you expect it as an action input, you specify it as shown below. If you set the default value for the token to be the GITHUB_TOKEN, then set the “is-default” attribute to true. Here is an [example](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/irongut/editrelease/action-security.yml):
42+
- If you expect it as an action input, you specify it as shown below. If you set the default value for the token to be the GITHUB_TOKEN, then set the “is-default” attribute to true. Here is an [example](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/irongut/editrelease/action-security.yml):
4343
``` yaml
4444
name: 'Edit Release'
4545
github-token:
@@ -48,7 +48,7 @@ For this scenario, follow these steps:
4848
is-default: false
4949
```
5050
3. Mention the permissions needed and a reason for the permissions. The reason must start with the word `to`.
51-
Here is an [example](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/peter-evans/create-or-update-comment/action-security.yml):
51+
Here is an [example](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/peter-evans/create-or-update-comment/action-security.yml):
5252
``` yaml
5353
name: 'Create or Update Comment'
5454
github-token:
@@ -78,7 +78,7 @@ The above two scenarios should take care of most of the cases. For more advanced
7878

7979
This example is for `peter-evans/close-issue` GitHub Action. It shows that the Action expects GitHub token as an action input, the name of the input is `token`, and that it is set to `GITHUB_TOKEN` as the default value. It also shows that the permissions needed for the Action are `issues: write` and the reason for that permission is specified in the `issues-reason` key.
8080

81-
[`knowledge-base/actions/peter-evans/close-issue/action-security.yml`](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/peter-evans/close-issue/action-security.yml)
81+
[`knowledge-base/actions/peter-evans/close-issue/action-security.yml`](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/peter-evans/close-issue/action-security.yml)
8282

8383
``` yaml
8484
github-token:
@@ -110,7 +110,7 @@ github-token:
110110

111111
This example is for `github/super-linter` GitHub Action. It shows that the Action expects GitHub token as an environment variable, the name of the environment variable is `GITHUB_TOKEN`. It also shows that the permissions needed for the Action are `statuses: write` and the reason for that permission is specified in the `statuses-reason` key.
112112

113-
[`knowledge-base/actions/github/super-linter/action-security.yml`](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/github/super-linter/action-security.yml)
113+
[`knowledge-base/actions/github/super-linter/action-security.yml`](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/github/super-linter/action-security.yml)
114114

115115
``` yaml
116116
name: 'Super-Linter'
@@ -129,7 +129,7 @@ github-token:
129129

130130
This example is for `actions/setup-node` GitHub Action. It shows that the Action expects GitHub token as an Action input. The permissions key is set, but no scopes are defined, since it only uses it for rate-limiting.
131131

132-
[`knowledge-base/actions/actions/setup-node/action-security.yml`](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/actions/setup-node/action-security.yml)
132+
[`knowledge-base/actions/actions/setup-node/action-security.yml`](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/actions/setup-node/action-security.yml)
133133

134134
``` yaml
135135
name: 'Setup Node.js environment'
@@ -152,7 +152,7 @@ github-token:
152152

153153
As an example, consider this `action-security.yml` for `peter-evans/close-issue` GitHub Action.
154154

155-
[`knowledge-base/actions/peter-evans/close-issue/action-security.yml`](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/peter-evans/close-issue/action-security.yml)
155+
[`knowledge-base/actions/peter-evans/close-issue/action-security.yml`](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/peter-evans/close-issue/action-security.yml)
156156

157157
``` yaml
158158
github-token:
@@ -189,7 +189,7 @@ jobs:
189189

190190
As an example, consider this `action-security.yml` for `dessant/lock-threads` GitHub Action. The `issues` scope only applies if either the `with` (action input) does not have `process-only` or `process-only` is set to `issues`.
191191

192-
[`knowledge-base/actions/dessant/lock-threads/action-security.yml`](https://github.com/step-security/secure-workflows/blob/main/knowledge-base/actions/dessant/lock-threads/action-security.yml)
192+
[`knowledge-base/actions/dessant/lock-threads/action-security.yml`](https://github.com/step-security/secure-repo/blob/main/knowledge-base/actions/dessant/lock-threads/action-security.yml)
193193

194194
``` yaml
195195
github-token:

0 commit comments

Comments
 (0)