Skip to content

ci: Pin GitHub Actions dependencies to commit SHAs for supply-chain security #20

@gkorland

Description

@gkorland

Summary

All third-party GitHub Actions in this repository's workflows are currently referenced by mutable version tags (e.g., actions/checkout@v4). This is a supply-chain security risk — tags can be force-pushed to point to malicious code.

Recommendation

Pin all third-party GitHub Actions to their full commit SHA while preserving the version in a comment for readability:

# Before (insecure)
uses: actions/checkout@v4

# After (secure)
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4

Affected Files

  • .github/workflows/dependency-review.yml
  • .github/workflows/frontend.yml
  • .github/workflows/lint.yml
  • .github/workflows/publish-docker.yml
  • .github/workflows/spellcheck.yml
  • .github/workflows/tests.yml

Actions Pinned

15 action references across 6 workflow file(s).

References

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions