refactor:[M3-7278] - SAST Scan Findings: Third party action not pinned to commit SHA #12649
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.

Description 📝
This PR addresses security vulnerabilities identified by SAST scanning by pinning third-party GitHub Actions to specific commit SHAs instead of mutable references like
@masteror@v4.Changes 🔄
pnpm/action-setup@v4to commit SHAa7487c7e89a18df4991f7f222e4898a00d66ddda(v4.1.0)rtCamp/action-slack-notify@masterto commit SHAe31e87e03dd19038e411e38ae27cbad084a90661(v2.3.3)jakejarvis/s3-sync-action@masterto commit SHAbe0c4ab89158cac4278689ebedd8407dd5f35a83(v0.5.1)cypress-io/github-action@v6to commit SHAb8ba51a856ba5f4c15cf39007636d4ab04f23e3c(v6.10.2)oven-sh/setup-bun@v2to commit SHA735343b667d3e6f658f44d0eca948eb6282f2b76(v2.0.2)pnpm/action-setup@v2to commit SHAeae0cfeb286e66ffb5155f1a79b90583a127a68b(v2.4.1)Scope 🚢
Upon production release, changes in this PR will be visible to:
Preview 📷
Prerequisites
semgrepif not already installed withpip install semgrepVerification steps
semgrep --config="r/yaml.github-actions.security.third-party-action-not-pinned-to-commit-sha.third-party-action-not-pinned-to-commit-sha"- the output should say "Findings: 0 (0 blocking)".Ex: Click on the "ESLint Review (api-v4)" below and observe job is using the pinned SHA on the details page:
ci.yml- ci / test-managereslint_review.yml- ESLint Review / ESLint Review (api-v4) (pull_request)coverage_badge.yml- No longer used, but if used in the future this would be observed at https://github.com/linode/manager/actions/workflows/coverage.ymlPost-merge we can check the
security-scanjob in GitHub Actions forsecurity_scan.yml, example:https://github.com/linode/manager/actions/runs/16785776661/job/47535731671
And we can check the
buildjob fordocs.yml, example:https://github.com/linode/manager/actions/runs/16785776667/job/47535731564
Author Checklists
As an Author, to speed up the review process, I considered 🤔
👀 Doing a self review
❔ Our contribution guidelines
🤏 Splitting feature into small PRs
➕ Adding a changeset
🧪 Providing/improving test coverage
🔐 Removing all sensitive information from the code and PR description
🚩 Using a feature flag to protect the release
👣 Providing comprehensive reproduction steps
📑 Providing or updating our documentation
🕛 Scheduling a pair reviewing session
📱 Providing mobile support
♿ Providing accessibility support
As an Author, before moving this PR from Draft to Open, I confirmed ✅