Skip to content

Commit 128a634

Browse files
Release v2.4.0 (#292)
1 parent 6dacdfc commit 128a634

File tree

6 files changed

+15
-14
lines changed

6 files changed

+15
-14
lines changed

README.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@
1515

1616
---
1717

18-
Harden-Runner GitHub Action installs a security agent on the GitHub-hosted runner (Ubuntu VM) to
18+
🔒 Harden-Runner GitHub Action installs a security agent on the GitHub-hosted runner (Ubuntu VM) to
1919

20-
1. Prevent exfiltration of credentials
21-
2. Detect tampering of source code during build
22-
3. Detect compromised dependencies and build tools
20+
1. Prevent exfiltration of credentials 🔑
21+
2. Detect tampering of source code during build 🕵️
22+
3. Detect compromised dependencies and build tools 🚨
2323

2424

2525
<p align="center">
@@ -77,19 +77,20 @@ For details, check out the documentation at https://docs.stepsecurity.io
7777
<img src="images/main-screenshot1.png" alt="Policy recommended by harden-runner">
7878
</p>
7979
80-
### Restrict egress traffic to allowed endpoints
80+
### 🚦 Restrict egress traffic to allowed endpoints
8181
8282
Once allowed endpoints are set in the policy in the workflow file, or in the [Policy Store](https://docs.stepsecurity.io/harden-runner/how-tos/block-egress-traffic#2-add-the-policy-using-the-policy-store)
8383
8484
- Harden-Runner blocks egress traffic at the DNS (Layer 7) and network layers (Layers 3 and 4).
8585
- It blocks DNS exfiltration, where attacker tries to send data out using DNS resolution
8686
- Blocks outbound traffic using IP tables
87+
- Wildcard domains are supported, e.g. you can add `*.data.mcr.microsoft.com:443` to the allowed list, and egress traffic will be allowed to `eastus.data.mcr.microsoft.com:443` and `westus.data.mcr.microsoft.com:443`.
8788

8889
<p align="left">
8990
<img src="images/block-outbound-call.png" alt="Policy recommended by harden-runner" >
9091
</p>
9192

92-
### Detect tampering of source code during build
93+
### 🕵️ Detect tampering of source code during build
9394

9495
Harden-Runner monitors file writes and can detect if a file is overwritten.
9596

@@ -101,7 +102,7 @@ Harden-Runner monitors file writes and can detect if a file is overwritten.
101102
<img src="images/fileoverwrite.png" alt="Policy recommended by harden-runner" >
102103
</p>
103104

104-
### Run your job without sudo access
105+
### 🚫 Run your job without sudo access
105106

106107
GitHub-hosted runner uses passwordless sudo for running jobs.
107108

@@ -110,7 +111,7 @@ GitHub-hosted runner uses passwordless sudo for running jobs.
110111
recommendation to disable sudo in the insights page
111112
- When you set `disable-sudo` to `true`, the job steps run without sudo access to the Ubuntu VM
112113

113-
### Get security alerts
114+
### 🔔 Get security alerts
114115

115116
Install the [Harden Runner App](https://github.com/marketplace/harden-runner-app) to get security alerts.
116117

dist/pre/index.js

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

dist/pre/index.js.map

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "step-security-harden-runner",
3-
"version": "2.3.1",
3+
"version": "2.4.0",
44
"description": "Security agent for GitHub-hosted runner to monitor the build process",
55
"main": "index.js",
66
"scripts": {

src/checksum.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ export function verifyChecksum(downloadPath: string) {
1010
.digest("hex"); // checksum of downloaded file
1111

1212
const expectedChecksum: string =
13-
"10fd5587cfeba6aac4125be78ee32f60d5e780de10929f454525670c4c16935d"; // checksum for v0.12.2
13+
"a1e79e4d7323a63a845c446b9a964a772b0ab7dff9fc94f8a1d10e901f2acde1"; // checksum for v0.13.2
1414

1515
if (checksum !== expectedChecksum) {
1616
core.setFailed(

src/setup.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ import * as utils from '@actions/cache/lib/internal/cacheUtils'
145145
let auth = `token ${token}`;
146146

147147
const downloadPath: string = await tc.downloadTool(
148-
"https://github.com/step-security/agent/releases/download/v0.12.2/agent_0.12.2_linux_amd64.tar.gz",
148+
"https://github.com/step-security/agent/releases/download/v0.13.2/agent_0.13.2_linux_amd64.tar.gz",
149149
undefined,
150150
auth
151151
);

0 commit comments

Comments
 (0)