You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@shiro.apache.org by "step-security-bot (via GitHub)" <gi...@apache.org> on 2023/01/31 06:46:38 UTC

[GitHub] [shiro] step-security-bot opened a new pull request, #706: [StepSecurity] ci: Harden GitHub Actions

step-security-bot opened a new pull request, #706:
URL: https://github.com/apache/shiro/pull/706

   ## Summary
   
   This pull request is created by [Secure Workflows](https://app.stepsecurity.io/securerepo) at the request of @coheigea. Please merge the Pull Request to incorporate the requested changes. Please tag @coheigea on your message if you have any questions related to the PR. You can also engage with the [StepSecurity](https://github.com/step-security) team by tagging @step-security-bot.
   
   ## Security Fixes
   
   ### Least Privileged GitHub Actions Token Permissions
   
   The least privilged token permissions were calculate using [Secure WorkFlows](https://github.com/step-security/secure-workflows) based on the actions included in the GitHub Workflow files. This is recommended by GitHub as well as The Open Source Security Foundation (OpenSSF).
   
   - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow)
   - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)
   ### Pinned Dependencies
   
   A *pinned dependency* is a dependency that is explicitly set to a specific hashed version instead of a mutable version. Pinned dependencis ensure that development and deployment are done with the same software versions which reduces deployment risks, and enables reproducibility. It can help mitigate compromised dependencies from undermining the security of the project in certain scenarios. The dependencies were pinned using [Secure WorkFlows](https://github.com/step-security/secure-workflows)
   
   - [GitHub Security Guide](https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)
   - [The Open Source Security Foundation (OpenSSF) Security Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)
   
   
   ## Feedback
   For bug reports, feature requests, and general feedback; please create an issue in [step-security/secure-workflows](https://github.com/step-security/secure-workflows). To create such PRs, please visit https://app.stepsecurity.io/securerepo.
   
   
   Signed-off-by: StepSecurity Bot <bo...@stepsecurity.io>


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscribe@shiro.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [shiro] coheigea merged pull request #706: [StepSecurity] ci: Harden GitHub Actions

Posted by "coheigea (via GitHub)" <gi...@apache.org>.
coheigea merged PR #706:
URL: https://github.com/apache/shiro/pull/706


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscribe@shiro.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org