-
Notifications
You must be signed in to change notification settings - Fork 28
Open
Description
Security Issue: Unpinned GitHub Actions
File: .github/workflows/linkchecker.yml
Problem
The linkchecker workflow uses actions/checkout@master, which is a security risk because:
- The
@masterbranch can receive breaking changes at any time without warning - Malicious code could be injected into the action's master branch by compromising the upstream repository
- This creates supply chain security vulnerabilities
- Builds become non-reproducible and unpredictable
- For a cryptography SDK like this FHE project, supply chain security is critical
Using unpinned actions violates GitHub's security best practices and can lead to:
- Unexpected workflow failures
- Security vulnerabilities being introduced silently
- Compromised build artifacts
Current Code
- uses: actions/checkout@master # SECURITY RISKRecommended Fix
Pin all GitHub Actions to specific version tags (e.g., actions/checkout@v4) or commit hashes for maximum security. Version tags provide a balance between security and maintainability. For critical security workflows, consider using commit SHA hashes.
Recommended change:
- uses: actions/checkout@v4 # Pinned to stable versionReferences
This issue is part of a comprehensive CI/CD security audit of the relayer-sdk project.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels