Skip to content

CI: hardened GitHub Actions workflows (least privilege, pinned SHAs, OIDC) #76

@mwaldheim

Description

@mwaldheim

Goal

All GitHub Actions workflows must follow supply chain security best practices — checked by OpenSSF Scorecard 'Token-Permissions' and 'Dangerous-Workflow' checks.

Tasks

  • Set permissions: read-all at top level of every workflow, grant only what's needed per job
  • Pin all uses: action references to full commit SHAs (not tags)
  • Use OIDC token for cloud auth (no long-lived secrets)
  • No pull_request_target with untrusted code checkout
  • Add GITHUB_TOKEN minimal scope annotations
  • Validate third-party actions (use �ctionlint in CI)
  • Add �ctionlint GitHub Action check

Metadata

Metadata

Assignees

No one assigned

    Labels

    area: ciCI/CD & GitHub Actionsarea: cncfCNCF compliance, governance and supply chain securitypriority: highHigh prioritytype: choreMaintenance / scaffolding

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions