Skip to content

Commit 78ba77f

Browse files
Update README.md
1 parent 01f224a commit 78ba77f

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

README.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,16 @@
1-
# Security agent for Github-hosted runner
1+
# Harden-Runner: The Security agent for Github-hosted runner
22

33
Harden-Runner GitHub Action installs a security agent on the Github-hosted runner to prevent exfiltration of credentials, monitor the build process, and detect compromised dependencies.
44
<p align="left">
55
<img src="https://github.com/arjundashrath/supply-chain-goat/blob/patch-2/images/harden-runner/HardenRunnerGIFV.gif" alt="Link in build log" width="1440" >
66
</p>
77

8-
## Problem
8+
## Why use Harden-Runner?
99
Hijacked dependencies and compromised build tools typically make outbound requests during the build process to exfiltrate data or credentials. There is also a risk that a compromised dependency or build tool may modify source code, dependencies, or artifacts during the build process.
1010

11-
## Solution
11+
Harden-Runner is a first-of-its-kind technology that automatically correlates outbound traffic, file modifications, and process activity with each step of a workflow. You can also set a policy per job of a workflow to restrict outbound traffic.
12+
13+
## Using Harden-Runner
1214
1. Add `step-security/harden-runner` to your GitHub Actions workflow file as the first step in each job. In the pre step, the GitHub Actions installs a daemon that monitors process, file, and network activity.
1315

1416
```yaml
@@ -38,7 +40,7 @@ Hijacked dependencies and compromised build tools typically make outbound reques
3840
3941
When you use `egress-policy: block` mode, you can also set `disable-telemetry: true` to not send telemetry to the StepSecurity API.
4042

41-
## How past attacks would have been prevented
43+
## How Harden-Runner mitigates threats?
4244

4345
[Hands-on tutorials](https://github.com/step-security/supply-chain-goat) to learn how `harden-runner` would have prevented past software supply chain attacks.
4446

0 commit comments

Comments
 (0)