GitHub Actions Update #333
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This pull request makes several improvements to the project's GitHub Actions workflows, focusing on enhanced security, up-to-date dependencies, and improved supply chain analysis. The main changes include updating action versions to specific commit SHAs for better security, adding a new workflow for OSSF Scorecard analysis, and making minor configuration improvements across workflows.
Security and Dependency Updates:
Updated all occurrences of
actions/checkout,actions/setup-node, and other major GitHub Actions to reference specific commit SHAs instead of floating version tags, improving supply chain security and build reproducibility. (.github/workflows/build.yml,.github/workflows/codeql-analysis.yml,.github/workflows/dependency-review.yml,.github/workflows/npm-publish.yml,.github/workflows/super-linter.yml,.github/workflows/test.yml) [1] [2] [3] [4] [5] [6] [7]Set
persist-credentials: falsefor allactions/checkoutsteps to reduce the risk of leaking repository credentials in workflow runs. [1] [2] [3] [4] [5] [6] [7]Supply Chain Security:
.github/workflows/ossf-scorecard.ymlworkflow to automatically run OSSF Scorecard supply chain security analysis on the repository, with results uploaded as SARIF files and published to GitHub code scanning.Linter and Quality Tooling:
super-linterto a specific commit SHA, and disabled Biome and other unneeded validators for more focused linting.Workflow File Improvements:
.github/workflows/npmpublish.ymlto.github/workflows/npm-publish.ymlfor consistency and clarity. [1] [2]