Conversation
Set persist-credentials: false in actions/checkout to prevent git credentials from being stored on disk where they could accidentally be included in publicly accessible artifacts. See: https://docs.zizmor.sh/audits/#artipacked
Add explicit permissions block with only contents: read instead of relying on potentially broad default GITHUB_TOKEN permissions. See: https://docs.zizmor.sh/audits/#excessive-permissions
Pin third-party actions to specific commit hashes instead of mutable version tags to prevent supply chain attacks from compromised or hijacked action repositories. - erlef/setup-beam@v1 → fc68ffb90438ef2936bbb3251622353b3dcb2f93 (v1.24.0) - codecov/codecov-action@v4 → b9fd7d16f6d7d1b5d2bec1a2887e65ceed900238 (v4.6.0) See: https://docs.zizmor.sh/audits/#unpinned-uses
- actions/checkout v4.3.1 → v6.0.2 - codecov/codecov-action v4.6.0 → v6.0.0
Configure weekly grouped PRs for all action dependencies.
Analyze GitHub Actions workflows for security vulnerabilities. Runs on push/PR to main and weekly on Mondays.
Scan GitHub Actions workflows for security issues using zizmor, reporting findings via GitHub Security tab (SARIF).
|
You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool. What Enabling Code Scanning Means:
For more information about GitHub Code Scanning, check out the documentation. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR contains multiple commits improving GitHub Actions security:
persist-credentials: falsetoactions/checkoutcontents: readpermissionsactions/checkout: v4.3.1 → v6.0.2codecov/codecov-action: v4.6.0 → v6.0.0Similar changes have already been applied to:
Required Repository Settings
After merging, enable the following repository settings in "Rules" / "Rulesets":
Add "Require code scanning results" with the following tools:
CodeQLzizmorSet "Security Alerts" and "Alert" to "All":
That way PR merges are blocked until all issues have been identified.
References