Skip to content

strimzi-kafka-operator/0.49.1-r5: fix GHSA-cphf-4846-3xx9

6313974
Select commit
Loading
Failed to load commit list.
Closed

strimzi-kafka-operator/0.49.1-r5: cve remediation #78295

strimzi-kafka-operator/0.49.1-r5: fix GHSA-cphf-4846-3xx9
6313974
Select commit
Loading
Failed to load commit list.
StepSecurity Actions Security / StepSecurity Harden-Runner succeeded Jan 16, 2026 in 3m 23s

No anomalous activity on CI/CD runners

No new Harden-Runner detections for this pull request.

Details

Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.

📋 Monitored GitHub Actions workflow runs

The following GitHub Actions workflow runs were monitored as part of this pull request.

Workflow Run ID Unique Destinations Actions Used Detailed Insights
codeql 21064927549 - - Harden-Runner not enabled
approve-from-label.yaml 21065437016 - - Harden-Runner not enabled
approve-from-label.yaml 21065437029 - - Harden-Runner not enabled
approve-from-label.yaml 21065312279 - - Harden-Runner not enabled
approve-from-label.yaml 21064929257 - - Harden-Runner not enabled
approve-from-label.yaml 21064928605 - - Harden-Runner not enabled
approve-from-label.yaml 21064928462 - - Harden-Runner not enabled
wolfictl-lint.yaml 21064928387 1 3 View Insights
approve-from-label.yaml 21065436963 - - Harden-Runner not enabled
approve-from-label.yaml 21065436930 - - Harden-Runner not enabled
approve-from-label.yaml 21064928693 - - Harden-Runner not enabled
approve-from-label.yaml 21064928517 - - Harden-Runner not enabled
approve-from-label.yaml 21064928485 - - Harden-Runner not enabled
lint.yaml 21064928380 10 5 View Insights

📚 Learn More

You can learn more about this GitHub check here