Skip to content

[StepSecurity] Apply security best practices#8

Closed
stepsecurity-app[bot] wants to merge 1 commit intomainfrom
chore/GHA-221422-stepsecurity-remediation
Closed

[StepSecurity] Apply security best practices#8
stepsecurity-app[bot] wants to merge 1 commit intomainfrom
chore/GHA-221422-stepsecurity-remediation

Conversation

@stepsecurity-app
Copy link
Copy Markdown
Contributor

Summary

This PR implements go/ssdlc-2. Ref: https://github.com/chainguard-dev/prodsec/issues/138

This pull request has been generated by StepSecurity as part of your enterprise subscription to ensure compliance with recommended security best practices. Please review and merge the pull request to apply these security enhancements.

At a high level, this PR:

  • Adds the harden-runner Action if not already present
  • Pins Actions to a digest rather than mutable tags
  • Restricts GitHub token permissions to be as minimal as possible

Security Fixes

Harden Runner

Harden-Runner is an open-source security agent for the GitHub-hosted runner to prevent software supply chain attacks. It prevents exfiltration of credentials, detects tampering of source code during build, and enables running jobs without sudo access.

Feedback

For bug reports, feature requests, and general feedback; please create an issue in step-security/secure-repo or contact us via our website.

Signed-off-by: StepSecurity Bot <bot@stepsecurity.io>
@eslerm eslerm closed this May 22, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant