Skip to content

v1.0.13

Choose a tag to compare

@github-actions github-actions released this 22 Jan 11:37
· 7 commits to main since this release
57e85ec

🩹[Patch]: Update GitHub Actions security and linting configuration (#36)

This update improves the security posture of GitHub Actions workflows by addressing zizmor linting warnings. All action references are now pinned to specific commit hashes, permissions follow the principle of least privilege, and insecure workflow triggers have been replaced with safer alternatives.

Security improvements

Pinned action references

All GitHub Actions are now pinned to specific commit SHA hashes instead of mutable tags, preventing supply chain attacks:

  • actions/checkoutde0fac2e4500dabe0009e67214ff5f5447ce83dd (v6.0.2)
  • actions/upload-artifactea165f8d65b6e75b540449e92b4886f43607fa02 (v4.6.2)
  • super-linter/super-linterd5b0a2ab116623730dd094f15ddc1b6b25bf7b99 (v8.3.2)
  • super-linter/super-linter/slim2bdd90ed3262e023ac84bf8fe35dc480721fc1f2 (v8.2.1)
  • PSModule/Auto-Releaseeabd533035e2cb9822160f26f2eda584bd012356 (v1.9.5)
  • PSModule/Install-PSModuleHelpersd60d63e4be477d1ca0c67c6085101fb109bce8f1 (v1.0.6)

Workflow trigger security

Changed pull_request_target to pull_request in Auto-Release workflow to prevent potential code injection attacks from forked repositories.

Least privilege permissions

Moved statuses: write permission from workflow-level to job-level in Action-Test workflow, applying it only to the ActionTestDefault job that actually requires it for the linter.

Credential persistence

Added persist-credentials: false to checkout steps to prevent credential persistence in artifacts.

Linting configuration

  • Enabled VALIDATE_GITHUB_ACTIONS_ZIZMOR in Linter workflow (previously disabled)
  • Updated dependabot schedule to daily with 7-day cooldown for better dependency management