-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Weak GitHub OIDC Claim Verification #204
Comments
Thank you for your proposal.
This is For example, in case of AWS, IAM Role's trust policy should be configured properly. e.g. "Condition": {
"StringEquals": {
"token.actions.githubusercontent.com:aud": "sts.amazonaws.com",
"token.actions.githubusercontent.com:sub": "repo:octo-org/octo-repo:ref:refs/heads/octo-branch"
}
} This is the setting of AWS, not GitHub Actions. |
If you have any ideas of new lint rules, could you tell us examples? e.g. https://github.com/suzuki-shunsuke/ghalint#job_permissions Lines 29 to 81 in 187f8c9
|
@suzuki-shunsuke I don't have good idea on linting rules but if we can create rules for checking as written in this blog around github security best practices - https://engineering.salesforce.com/github-actions-security-best-practices-b8f9df5c75f5/ then that can be run as part of ghalint tool. |
Something like this one - https://github.com/turbot/steampipe-mod-github-sherlock |
I read the blog post https://engineering.salesforce.com/github-actions-security-best-practices-b8f9df5c75f5/ and created some issues. |
I close this issue because the problem and action are not clear. I already created some issues based on some best practices and handled some of them. |
Ensure IAM policies to integrate with GitHub's OIDC provider validate the subject claim to limit the context in which the role can be assumed. If there are no conditions or the condition is too permissive, it could allow unintended repositories to assume the role.
Doc reference - https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect
The text was updated successfully, but these errors were encountered: