ci: apply security best practices #161
Analyzing network traffic from CI/CD runners...
Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.
Details
Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.
⏳ Workflow Runs In Progress
The check is waiting for the following GitHub Actions workflow runs to complete:
Need to cancel this check? You can cancel it by visiting https://app.stepsecurity.io/github/step-security/checks/harden-runner
📋 Monitored GitHub Actions workflow runs
The following GitHub Actions workflow runs were monitored as part of this pull request.
| Workflow | Run ID | Unique Destinations | Actions Used | Detailed Insights |
|---|---|---|---|---|
| guarddog.yml | 16834447846 | - | - | Harden-Runner not enabled |
| test.yml | 16834447765 | 3 | 4 | View Insights |
| dependency-review.yml | 16834447744 | 3 | 3 | View Insights |
| verify-on-container-alpine.yml | 16834447105 | - | - | Harden-Runner not enabled |
| verify-on-ubuntu.yml | 16834447088 | 1 | 2 | View Insights |
| verify-on-macos.yml | 16834447090 | - | - | Harden-Runner not enabled |
| codeql.yml | 16834447733 | 3 | 3 | View Insights |
| verify-on-container-ubuntu.yml | 16834447085 | - | - | Harden-Runner not enabled |
| build.yml | 16834447049 | 2 | 3 | View Insights |
📚 Learn More
You can learn more about this GitHub check here