You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
chore(security): pin github actions to commit SHAs
Addresses OSSF Scorecard's Pinned-Dependencies check (currently 5/10).
All third-party actions were pinned to floating major-version tags
(actions/checkout@v5, googleapis/release-please-action@v4, etc),
which means a compromised tag upstream would silently run in CI.
Scorecard wants every `uses:` ref to pin to a 40-character commit
SHA; the `# v<major>` comment preserves the intent and lets
Dependabot propose updates.
No major version upgrades performed - each SHA is whatever the
existing major-tag currently points to on its upstream repo. The
new references are:
actions/checkout@93cb6ef # v5
actions/setup-node@a0853c2 # v5
amannn/action-semantic-pull-request@e32d7e6 # v5
googleapis/release-please-action@16a9c90 # v4
github/codeql-action@5c8a8a6 # v3.35.1
peter-evans/create-pull-request@22a9089 # v7
Touches seven workflows: ci.yml, conventional-pr-title.yml,
production-hygiene.yml, publish-npm.yml, release-please.yml,
scorecard.yml, upstream-pass-cli-watch.yml. scorecard.yml already
had the first-party actions pinned; this completes it with the
codeql upload-sarif step.
Verified with the ossf-scorecard plugin's workflow-audit skill:
pinned-dependencies domain now reports 0 findings.
🤖 Generated with Claude Code
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
0 commit comments