Skip to content

Conversation

@ali-kafel
Copy link

Summary

This pull request focuses on improving the security and reliability of the GitHub Actions workflows by hardening the CI runners, restricting network egress, and pinning all third-party action dependencies to specific commit SHAs. These changes help prevent supply chain attacks and ensure consistent, auditable builds.

Detail

Key changes include:

Security hardening:

  • Added the step-security/harden-runner action to all major workflows (ci.yml, coverage.yml, bytecode-verification.yml, check-pr.yml) to block or audit outbound network calls and enforce a global allowed endpoints policy. [1] [2] [3] [4] [5]
  • Set permissions: id-token: write for jobs to enable the use of GitHub OIDC tokens, which are often required by hardened runners and for secure authentication in CI/CD pipelines. [1] [2] [3] [4]

Dependency management and reproducibility:

  • Pinned all third-party GitHub Actions (such as actions/checkout, actions/download-artifact, actions/upload-artifact, mikepenz/action-junit-report, sidx1024/report-nyc-coverage-github-action, and actions/github-script) to specific commit SHAs to prevent unexpected changes and improve build reproducibility. [1] [2] [3] [4] [5] [6] [7] [8]

These updates collectively strengthen the security posture of the CI/CD pipelines and make workflows more robust and predictable.

Testing

Documentation


Requested Reviewers: @mention

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant