Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security policy fixes #1529

Merged
merged 1 commit into from
Jul 1, 2022
Merged

Conversation

lgritz
Copy link
Collaborator

@lgritz lgritz commented Jun 28, 2022

  • Set up a SECURITY.md explaining how to confidentially report
    vulnerabilities.

  • Create scorecards.yml workflow to run OSSF scorecard to check supply
    chain security issues.

  • Use exact SHA's for actions versions to guard against hijacked
    actions repos that might try to substutite something else at the
    version tag we use.

  • Make sure actions we use don't get write perms on our repo.

  • Tried to use harden-runner action to ensure no actions on the runner
    overwrite source code or have unauthorized outgoing net connections
    during the GHA run, but currently leaving it disabled because of too
    many false positives -- it flags every dependency download as a case
    of altering source code. Which it technically is, but it doesn't
    matter for any jobs that aren't producing any artifacts that will be
    consumed or relied on by users.

Signed-off-by: Larry Gritz [email protected]

* Set up a SECURITY.md explaining how to confidentially report
  vulnerabilities.

* Create scorecards.yml workflow to run OSSF scorecard to check supply
  chain security issues.

* Use exact SHA's for actions versions to guard against hijacked
  actions repos that might try to substutite something else at the
  version tag we use.

* Make sure actions we use don't get write perms on our repo.

* Tried to use harden-runner action to ensure no actions on the runner
  overwrite source code or have unauthorized outgoing net connections
  during the GHA run, but currently leaving it disabled because of too
  many false positives -- it flags every dependency download as a case
  of altering source code. Which it technically is, but it doesn't
  matter for any jobs that aren't producing any artifacts that will be
  consumed or relied on by users.

Signed-off-by: Larry Gritz <[email protected]>
@lgritz lgritz merged commit 2ece55a into AcademySoftwareFoundation:main Jul 1, 2022
lgritz added a commit to lgritz/OpenShadingLanguage that referenced this pull request Jul 1, 2022
* Set up a SECURITY.md explaining how to confidentially report
  vulnerabilities.

* Create scorecards.yml workflow to run OSSF scorecard to check supply
  chain security issues.

* Use exact SHA's for actions versions to guard against hijacked
  actions repos that might try to substutite something else at the
  version tag we use.

* Make sure actions we use don't get write perms on our repo.

* Tried to use harden-runner action to ensure no actions on the runner
  overwrite source code or have unauthorized outgoing net connections
  during the GHA run, but currently leaving it disabled because of too
  many false positives -- it flags every dependency download as a case
  of altering source code. Which it technically is, but it doesn't
  matter for any jobs that aren't producing any artifacts that will be
  consumed or relied on by users.

Signed-off-by: Larry Gritz <[email protected]>
@lgritz lgritz deleted the lg-security branch July 1, 2022 06:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants