strimzi-kafka-operator/0.49.1-r5: cve remediation #78295
Closed
StepSecurity Actions Security / StepSecurity Harden-Runner
succeeded
Jan 16, 2026 in 3m 23s
No anomalous activity on CI/CD runners
No new Harden-Runner detections for this pull request.
Details
Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.
📋 Monitored GitHub Actions workflow runs
The following GitHub Actions workflow runs were monitored as part of this pull request.
| Workflow | Run ID | Unique Destinations | Actions Used | Detailed Insights |
|---|---|---|---|---|
| codeql | 21064927549 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21065437016 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21065437029 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21065312279 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21064929257 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21064928605 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21064928462 | - | - | Harden-Runner not enabled |
| wolfictl-lint.yaml | 21064928387 | 1 | 3 | View Insights |
| approve-from-label.yaml | 21065436963 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21065436930 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21064928693 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21064928517 | - | - | Harden-Runner not enabled |
| approve-from-label.yaml | 21064928485 | - | - | Harden-Runner not enabled |
| lint.yaml | 21064928380 | 10 | 5 | View Insights |
📚 Learn More
You can learn more about this GitHub check here
Loading