CI/CD Supply Chain Hardening #34
homelabforge
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
What changed
All GitHub Actions workflow references have been pinned to full-length commit SHAs instead of mutable version tags. Additionally:
permissions: contents: readadded to CI workflows (previously defaulted to broad write-all)mainwith required status checks (Backend Tests, Frontend Tests, E2E Tests, Docker Build Test, API Types Freshness, CodeQL Analyze, Security Scan Summary)sha_pinning_requiredenabled at the repo level — GitHub now rejects any workflow run that references actions by tagWhy
The Trivy supply chain attack (March 2026) demonstrated how tag-based action references can be weaponized. An attacker force-pushes a tag on an action repo, and every downstream CI run executes their code with whatever permissions the workflow grants — including GHCR push access.
This project had 17 tag-based action references across 5 workflow files and zero SHA pins. All of them are now pinned.
What this means going forward
github-actionsecosystem (monthly)@v6instead of@sha) will be rejected by GitHub before CI even runsgh pr merge --auto(used by Dependabot auto-merge) actually waits for CI to pass before mergingBeta Was this translation helpful? Give feedback.
All reactions