You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@shiro.apache.org by "step-security-bot (via GitHub)" <gi...@apache.org> on 2023/01/31 06:46:38 UTC
[GitHub] [shiro] step-security-bot opened a new pull request, #706: [StepSecurity] ci: Harden GitHub Actions
step-security-bot opened a new pull request, #706:
URL: https://github.com/apache/shiro/pull/706
## Summary
This pull request is created by [Secure Workflows](https://app.stepsecurity.io/securerepo) at the request of @coheigea. Please merge the Pull Request to incorporate the requested changes. Please tag @coheigea on your message if you have any questions related to the PR. You can also engage with the [StepSecurity](https://github.com/step-security) team by tagging @step-security-bot.
## Security Fixes
### Least Privileged GitHub Actions Token Permissions
The least privilged token permissions were calculate using [Secure WorkFlows](https://github.com/step-security/secure-workflows) based on the actions included in the GitHub Workflow files. This is recommended by GitHub as well as The Open Source Security Foundation (OpenSSF).
- [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)
- [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)
### Pinned Dependencies
A *pinned dependency* is a dependency that is explicitly set to a specific hashed version instead of a mutable version. Pinned dependencis ensure that development and deployment are done with the same software versions which reduces deployment risks, and enables reproducibility. It can help mitigate compromised dependencies from undermining the security of the project in certain scenarios. The dependencies were pinned using [Secure WorkFlows](https://github.com/step-security/secure-workflows)
- [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)
- [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)
## Feedback
For bug reports, feature requests, and general feedback; please create an issue in [step-security/secure-workflows](https://github.com/step-security/secure-workflows). To create such PRs, please visit https://app.stepsecurity.io/securerepo.
Signed-off-by: StepSecurity Bot <bo...@stepsecurity.io>
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: commits-unsubscribe@shiro.apache.org
For queries about this service, please contact Infrastructure at:
users@infra.apache.org
[GitHub] [shiro] coheigea merged pull request #706: [StepSecurity] ci: Harden GitHub Actions
Posted by "coheigea (via GitHub)" <gi...@apache.org>.
coheigea merged PR #706:
URL: https://github.com/apache/shiro/pull/706
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: commits-unsubscribe@shiro.apache.org
For queries about this service, please contact Infrastructure at:
users@infra.apache.org