ci: apply security best practices #261
Closed
StepSecurity Actions Security Int / StepSecurity Harden-Runner
succeeded
Jun 5, 2025 in 2m 17s
No anomalous activity on CI/CD runners
No new Harden-Runner detections for this pull request.
Details
Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.
📋 Monitored GitHub Actions workflow runs
The following GitHub Actions workflow runs were monitored as part of this pull request.
| Workflow | Run ID | Unique Destinations | Actions Used | Detailed Insights |
|---|---|---|---|---|
| tj-actions-changed-files-incident.yaml | 15471001958 | - | - | Harden-Runner not enabled |
| changed-files-vulnerability-without-hr.yml | 15471001972 | - | - | Harden-Runner not enabled |
| PRTargetWorkflow.yml | 15471001973 | - | - | Harden-Runner not enabled |
| changed-files-vulnerability-with-hr.yml | 15471001961 | - | - | Harden-Runner not enabled |
| baseline_checks.yml | 15471001954 | 4 | 4 | View Insights |
📚 Learn More
You can learn more about this GitHub check here
Loading