Skip to content

Commit 099b573

Browse files
[StepSecurity] Apply security best practices
Signed-off-by: StepSecurity Bot <bot@stepsecurity.io>
1 parent 312fb81 commit 099b573

File tree

2 files changed

+17
-7
lines changed

2 files changed

+17
-7
lines changed

.github/workflows/build.yml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,24 +13,29 @@ jobs:
1313

1414
steps:
1515
# Checkout repo using https://github.com/marketplace/actions/checkout
16+
- name: Harden the runner (Audit all outbound calls)
17+
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
18+
with:
19+
egress-policy: audit
20+
1621
- name: Checkout
17-
uses: actions/checkout@v4
22+
uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4.3.1
1823

1924
- name: Set up JDK 1.8
20-
uses: actions/setup-java@v4
25+
uses: actions/setup-java@c5195efecf7bdfc987ee8bae7a71cb8b11521c00 # v4.7.1
2126
with:
2227
distribution: 'temurin'
2328
java-version: 8
2429

2530
# Aerospike cluster for integration tests (https://github.com/reugn/github-action-aerospike)
2631
- name: Set up Aerospike Database
27-
uses: reugn/github-action-aerospike@v1
32+
uses: reugn/github-action-aerospike@2065a9209cfd5ef88a3e07f3e7929e321d1e0067 # v1.1.0
2833
with:
2934
server-version: 7.2.0.6
3035

3136
# See: https://github.com/actions/cache/blob/master/examples.md#java---maven
3237
- name: Cache local Maven repository
33-
uses: actions/cache@v4
38+
uses: actions/cache@0057852bfaa89a56745cba8c7296529d2fc39830 # v4.3.0
3439
with:
3540
path: ~/.m2/repository
3641
key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}

.github/workflows/snyk-scan.yml

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,16 @@ jobs:
1313
security-events: write
1414
runs-on: ubuntu-latest
1515
steps:
16+
- name: Harden the runner (Audit all outbound calls)
17+
uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
18+
with:
19+
egress-policy: audit
20+
1621
- name: Checkout
17-
uses: actions/checkout@v4
22+
uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4.3.1
1823

1924
- name: Run Snyk to check for vulnerabilities
20-
uses: snyk/actions/maven@master
25+
uses: snyk/actions/maven@9adf32b1121593767fc3c057af55b55db032dc04 # master
2126
continue-on-error: true # To make sure that SARIF upload gets called
2227
env:
2328
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
@@ -39,6 +44,6 @@ jobs:
3944
4045
- name: Upload result to GitHub Code Scanning
4146
if: steps.out-file.outputs.exists == 'true'
42-
uses: github/codeql-action/upload-sarif@v3
47+
uses: github/codeql-action/upload-sarif@497990dfed22177a82ba1bbab381bc8f6d27058f # v3.31.6
4348
with:
4449
sarif_file: snyk.sarif

0 commit comments

Comments
 (0)