Skip to content

Bump actions/checkout from 4 to 6#2

Closed
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/github_actions/actions/checkout-6
Closed

Bump actions/checkout from 4 to 6#2
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/github_actions/actions/checkout-6

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Feb 7, 2026

Bumps actions/checkout from 4 to 6.

Release notes

Sourced from actions/checkout's releases.

v6.0.0

What's Changed

Full Changelog: actions/checkout@v5.0.0...v6.0.0

v6-beta

What's Changed

Updated persist-credentials to store the credentials under $RUNNER_TEMP instead of directly in the local git config.

This requires a minimum Actions Runner version of v2.329.0 to access the persisted credentials for Docker container action scenarios.

v5.0.1

What's Changed

Full Changelog: actions/checkout@v5...v5.0.1

v5.0.0

What's Changed

⚠️ Minimum Compatible Runner Version

v2.327.1
Release Notes

Make sure your runner is updated to this version or newer to use this release.

Full Changelog: actions/checkout@v4...v5.0.0

v4.3.1

What's Changed

Full Changelog: actions/checkout@v4...v4.3.1

v4.3.0

What's Changed

... (truncated)

Changelog

Sourced from actions/checkout's changelog.

Changelog

v6.0.2

v6.0.1

v6.0.0

v5.0.1

v5.0.0

v4.3.1

v4.3.0

v4.2.2

v4.2.1

v4.2.0

v4.1.7

v4.1.6

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [actions/checkout](https://github.com/actions/checkout) from 4 to 6.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](actions/checkout@v4...v6)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-version: '6'
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels Feb 7, 2026
Copy link
Contributor

@stuckvgn stuckvgn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔒 Security & Privacy Review (AI-Generated)

Security Improvements:

  • Supply Chain Security (Action Pinning): The workflow currently references the action by a mutable tag (@v6). In high-threat environments protecting activist infrastructure, this introduces a supply chain risk if the tag is hijacked or pointed to malicious code.
    • Recommendation: Pin the action to its immutable full commit SHA (e.g., uses: actions/checkout@<COMMIT-SHA>). Dependabot can be configured to automate this via versioning-strategy: increase-if-necessary combined with groups or specific configurations.

Security Notes:

  • Enhanced Credential Protection: The upgrade to v6 is a positive security step. The change in persist-credentials behavior (storing credentials in a separate file under $RUNNER_TEMP instead of .git/config) significantly reduces the risk of authentication tokens being leaked to untrusted scripts or subsequent steps in the pipeline.
  • Audit Capability: Continued support for fetch-depth: 0 ensures that the gitleaks scanner can access the full commit history. This is essential for detecting secrets hidden in previous commits, maintaining the integrity of your anti-surveillance measures.

Copy link
Contributor

@stuckvgn stuckvgn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚡ Performance & Scale Review (AI-Generated)

Performance Notes:
No performance concerns identified with the upgrade to actions/checkout@v6.

  • Runtime Verification: Validated that actions/checkout@v6 uses the Node.js 24 runtime. This upgrade ensures continued performance support and aligns with active LTS execution environments, preventing potential degradation associated with deprecated runtimes.
  • Scalability Observation (Existing Pattern): The workflow retains fetch-depth: 0 (fetching full git history). While fully supported in v6, full history checkout is an O(n) operation that linearly degrades as the repository functionality grows. For a documentation repo, this is manageable now, but if the repo scales significantly, consider implementing a strategy to only fetch compariable commits for gitleaks to optimize pipeline duration.

Copy link
Contributor

@stuckvgn stuckvgn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛡️ Correctness & Reliability Review (AI-Generated)

⚠️ Potential Reliability Issue: Credential Persistence Change

The upgrade to actions/checkout@v6 introduces a significant change in how git credentials are handled:

Credential Security: The persist-credentials feature now stores credentials in a separate file under $RUNNER_TEMP instead of writing them directly into .git/config.

Why this matters for Gitleaks:
Workflows named gitleaks.yml typically run the Gitleaks scanner, often as a Docker container action.

  1. Docker Compatibility: If the Gitleaks action attempts to run git commands that require authentication (or expects the token to be present in .git/config), it may fail inside the container because standard Docker actions don't automatically see the new $RUNNER_TEMP credential file unless the runner version is v2.329.0+.
  2. Silent Failure Risk: If the scanner cannot access the git configuration or history correctly due to this change, it might default to scanning the current checkout without history, or fail to report errors loudly, leading to a "green" build that didn't actually scan the history.

🔍 Verification Required

Please verify the CI logs for this run confirm that:

  1. The checkout step succeeds with fetch-depth: 0.
  2. The Gitleaks step explicitly logs that it is scanning the expected number of commits (not just 0 or 1).

If the scanner runs as a binary (not Docker) or doesn't need to fetch/authenticate, this change is safe. However, given the "Silent failures mean activists think they're making impact when they're not" mandate, we must verify the scanner is actually seeing the data.

@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Feb 7, 2026

Looks like actions/checkout is no longer a dependency, so this is no longer needed.

@dependabot dependabot bot closed this Feb 7, 2026
@dependabot dependabot bot deleted the dependabot/github_actions/actions/checkout-6 branch February 7, 2026 09:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant