Skip to content

Commit 74b568e

Browse files
Merge pull request #149 from step-security/rel-v1.4.4
Release v1.4.4
2 parents cdea734 + e667049 commit 74b568e

File tree

5 files changed

+42
-23
lines changed

5 files changed

+42
-23
lines changed

README.md

Lines changed: 37 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,40 @@
1+
<picture>
2+
<source media="(prefers-color-scheme: light)" srcset="images/banner.png" width="400">
3+
<img src="images/banner.png" width="400">
4+
</picture>
15

2-
# Harden-Runner
3-
[![harden-runner](images/banner.png)](#)
6+
[![Maintained by stepsecurity.io](https://img.shields.io/badge/maintained%20by-stepsecurity.io-blueviolet)](https://stepsecurity.io/?utm_source=github&utm_medium=organic_oss&utm_campaign=harden-runner)
7+
[![License: Apache 2.0](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://raw.githubusercontent.com/step-security/harden-runner/main/LICENSE)
8+
9+
---
410

511
Harden-Runner GitHub Action installs a security agent on the GitHub-hosted runner (Ubuntu VM) to
612

7-
1. Detect tampering of source code during build
8-
2. Prevent exfiltration of credentials
9-
3. Detect compromised dependencies or build tools
13+
1. Prevent exfiltration of credentials
14+
2. Detect compromised dependencies and build tools
15+
3. Detect tampering of source code during build
1016

1117
<p align="left">
1218
<img src="https://github.com/step-security/supply-chain-goat/blob/main/images/harden-runner/HardenRunnerGIFV.gif" alt="Demo using GIF" width="1440" >
1319
</p>
1420

1521
## Why
1622

17-
Hijacked dependencies and compromised build tools typically make outbound requests to exfiltrate data or credentials, or may modify source code, dependencies, or artifacts during the build.
23+
Compromised dependencies and build tools typically make outbound calls to exfiltrate data or credentials, or may tamper source code, dependencies, or artifacts during the build.
24+
25+
Harden-Runner GitHub Actions installs a daemon that monitors process, file, and network activity to:
26+
27+
| |Countermeasure |Threat|
28+
|--|----------|----------------|
29+
|1.| Block outbound calls that are not in the allowed list to prevent exfiltration of credentials |To prevent [Codecov breach](https://github.com/step-security/supply-chain-goat/blob/main/RestrictOutboundTraffic.md) scenario|
30+
|2.| Detect if source code is being overwritten during the build process to inject a backdoor | To detect [SolarWinds incident scenario](https://github.com/step-security/supply-chain-goat/blob/main/MonitorSourceCode.md)|
31+
|3.| Detect compromised dependencies that make unexpected outbound network calls | To detect [Dependency confusion](https://github.com/step-security/supply-chain-goat/blob/main/DNSExfiltration.md) and [Malicious dependencies](https://github.com/step-security/supply-chain-goat/blob/main/CompromisedDependency.md)
1832

19-
Harden-Runner helps you answer these two important questions:
20-
1. Is source code being overwritten during the build process to inject a backdoor? ([SolarWinds incident scenario](https://github.com/step-security/supply-chain-goat/blob/main/MonitorSourceCode.md))
21-
2. Are unexpected outbound network calls being made during the workflow? ([Codecov breach](https://github.com/step-security/supply-chain-goat/blob/main/RestrictOutboundTraffic.md), [Dependency confusion](https://github.com/step-security/supply-chain-goat/blob/main/DNSExfiltration.md), [Malicious dependency](https://github.com/step-security/supply-chain-goat/blob/main/CompromisedDependency.md) scenarios)
33+
Read this [case study](https://infosecwriteups.com/detecting-malware-packages-in-github-actions-7b93a9985635) on how Harden-Runner detected malicious packages in the NPM registry.
2234

2335
## How
2436

25-
1. Add `step-security/harden-runner` to your GitHub Actions workflow file as the first step in each job. In the pre step, the GitHub Actions installs a daemon that monitors process, file, and network activity.
37+
1. Add `step-security/harden-runner` to your GitHub Actions workflow file as the first step in each job.
2638

2739
```yaml
2840
steps:
@@ -37,7 +49,7 @@ Harden-Runner helps you answer these two important questions:
3749
<img src="https://github.com/step-security/supply-chain-goat/blob/main/images/harden-runner/ActionLog.png" alt="Link in build log" >
3850
</p>
3951
40-
3. Click on the link ([example link](https://app.stepsecurity.io/github/ossf/scorecard/actions/runs/2265028928)). You will see a process monitor view of what activities happened as part of each step. This currently includes the programs that made outbound calls and did file writes to source code or dependencies.
52+
3. Click on the link ([example link](https://app.stepsecurity.io/github/ossf/scorecard/actions/runs/2265028928)). You will see a process monitor view of what activities happened as part of each step.
4153
4254
<p align="left">
4355
<img src="https://github.com/step-security/supply-chain-goat/blob/main/images/harden-runner/OutboundCalls2.png" alt="Insights from harden-runner" >
@@ -48,7 +60,6 @@ Harden-Runner helps you answer these two important questions:
4860
<p align="left">
4961
<img src="https://github.com/step-security/supply-chain-goat/blob/main/images/harden-runner/RecomPolicy1.png" alt="Policy recommended by harden-runner" >
5062
</p>
51-
5263

5364
5. If outbound network call is made to an endpoint not in the allowed list or if source code is tampered, you will see an annotation in the workflow run.
5465

@@ -58,13 +69,13 @@ Harden-Runner helps you answer these two important questions:
5869

5970
## Support for private repositories
6071

61-
Install the [Harden Runner App](https://github.com/marketplace/harden-runner-app) if you want to use Harden-Runner GitHub Action for `Private` repositories.
72+
Install the [Harden Runner App](https://github.com/marketplace/harden-runner-app) to use Harden-Runner GitHub Action for `Private` repositories.
6273

63-
If you use Harden-Runner GitHub Action in a private repository, the generated insights URL is NOT public. You need to authenticate first to access it for private repository. Only those who have access to the repository can view it.
74+
- If you use Harden-Runner GitHub Action in a private repository, the generated insights URL is NOT public.
75+
- You need to authenticate first to access insights URL for private repository. Only those who have access to the repository can view it.
76+
- [Harden Runner App](https://github.com/marketplace/harden-runner-app) only needs `actions: read` permissions on your repositories.
6477

65-
Read this [case study on how Kapiche uses Harden Runner](https://www.stepsecurity.io/case-studies/kapiche/) to improve software supply chain security in their open source and private repositories.
66-
67-
[Harden Runner App](https://github.com/marketplace/harden-runner-app) only needs `actions: read` permissions on your repositories. You can install it on selected repositories, or all repositories in your organization.
78+
Read this [case study on how Kapiche uses Harden Runner](https://www.stepsecurity.io/case-studies/kapiche/) to improve software supply chain security in their open source and private repositories.
6879

6980
## Discussions
7081

@@ -76,7 +87,7 @@ If you have questions or ideas, please use [discussions](https://github.com/step
7687

7788
## Limitations
7889

79-
1. Harden-Runner GitHub Action only works for GitHub-hosted runners. Self-hosted runners are not supported.
90+
1. Harden-Runner GitHub Action only works for GitHub-hosted runners. Self-hosted runners are not supported.
8091
2. Only Ubuntu VM is supported. Windows and MacOS GitHub-hosted runners are not supported. There is a discussion about that [here](https://github.com/step-security/harden-runner/discussions/121).
8192
3. Harden-Runner is not supported when [job is run in a container](https://docs.github.com/en/actions/using-jobs/running-jobs-in-a-container) as it needs sudo access on the Ubuntu VM to run. It can be used to monitor jobs that use containers to run steps. The limitation is if the entire job is run in a container. That is not common for GitHub Actions workflows, as most of them run directly on `ubuntu-latest`.
8293

@@ -99,6 +110,14 @@ Some important workflows using harden-runner:
99110
|4.|[ossf/scorecard](https://github.com/ossf/scorecard/blob/main/.github/workflows/codeql-analysis.yml)|[Link to insights](https://app.stepsecurity.io/github/ossf/scorecard/actions/runs/2006162141)
100111
|5.|[Automattic/vip-go-mu-plugins](https://github.com/Automattic/vip-go-mu-plugins/blob/master/.github/workflows/e2e.yml)|[Link to insights](https://app.stepsecurity.io/github/Automattic/vip-go-mu-plugins/actions/runs/1758760957)
101112

113+
## How does it work?
114+
115+
Harden-Runner GitHub Action downloads and installs the StepSecurity Agent.
116+
117+
- The code to monitor file, process, and network activity is in the Agent.
118+
- The agent is written in Go and is open source at https://github.com/step-security/agent
119+
- The agent's build is reproducible. You can view the steps to reproduce the build [here](http://app.stepsecurity.io/github/step-security/agent/releases/latest).
120+
102121
## 1-minute Demo Video
103122

104123
https://user-images.githubusercontent.com/25015917/156026587-79356450-9b35-4254-9c2e-7f2cc8d81059.mp4

dist/pre/index.js

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

dist/pre/index.js.map

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/checksum.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ export function verifyChecksum(downloadPath: string) {
1010
.digest("hex"); // checksum of downloaded file
1111

1212
const expectedChecksum: string =
13-
"c1286b469a2ad8657d69cf96dfaa5b9166ee6fa46d46fcb9d454d5851aa964bd"; // checksum for v0.9.4
13+
"1edce693c412a8a1d6a3d72eec2e7af6de384cfa3320b7c051bb0bd260974725"; // checksum for v0.10.0
1414

1515
if (checksum !== expectedChecksum) {
1616
core.setFailed(

src/setup.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ import isDocker from "is-docker";
7171
let auth = `token ${token}`;
7272

7373
const downloadPath: string = await tc.downloadTool(
74-
"https://github.com/step-security/agent/releases/download/v0.9.4/agent_0.9.4_linux_amd64.tar.gz",
74+
"https://github.com/step-security/agent/releases/download/v0.10.0/agent_0.10.0_linux_amd64.tar.gz",
7575
undefined,
7676
auth
7777
);

0 commit comments

Comments
 (0)