WARNING: THIS SITE IS A MIRROR OF GITHUB.COM / IT CANNOT LOGIN OR REGISTER ACCOUNTS / THE CONTENTS ARE PROVIDED AS-IS / THIS SITE ASSUMES NO RESPONSIBILITY FOR ANY DISPLAYED CONTENT OR LINKS / IF YOU FOUND SOMETHING MAY NOT GOOD FOR EVERYONE, CONTACT ADMIN AT ilovescratch@foxmail.com
Skip to content

Conversation

@stepsecurity-app
Copy link
Contributor

This PR implements go/ssdlc-2. Please raise issues to ProdSec's on-call rotation.

Ref: https://github.com/chainguard-dev/prodsec/issues/138

Summary

This pull request has been generated by StepSecurity as part of your enterprise subscription to ensure compliance with recommended security best practices. Please review and merge the pull request to apply these security enhancements.

At a high level, this PR:

  • Adds the harden-runner Action if not already present
  • Pins Actions to a digest rather than mutable tags
  • Restricts GitHub token permissions to be as minimal as possible

Security Fixes

Least Privileged GitHub Actions Token Permissions

The GITHUB_TOKEN is an automatically generated secret to make authenticated calls to the GitHub API. GitHub recommends setting minimum token permissions for the GITHUB_TOKEN.

Feedback

For bug reports, feature requests, and general feedback; please create an issue in step-security/secure-repo or contact us via our website.

@imjasonh imjasonh merged commit de77f6f into main Dec 7, 2025
8 checks passed
@imjasonh imjasonh deleted the chore/GHA-062318-stepsecurity-remediation branch December 7, 2025 02:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants