-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Github: Add rule type that verifies that harden runner is the first step #141
Conversation
``` | ||
|
||
For more information, see | ||
https://github.com/marketplace/actions/aqua-security-trivy |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do we point to trivy?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
oops!!
The rule looks good, do you want to submit the placeholders for tests to get a green CI run? |
Crap, I clicked the wrong button and closed the PR by accident. Sorry! |
this adds a rule that verifies that the `harden-runner` action is part of the first step of each workflow. To test, you may call it as part of a profile that looks as follows: ```yaml --- version: v1 type: profile name: harden-runner context: provider: github repository: - type: step_security_harden_runner_enabled def: {} ``` Signed-off-by: Juan Antonio Osorio <[email protected]>
@jhrozek I can do that. However, I don't think we should block on that. External contributors wouldn't be able to add new rule types. |
We don't have to block on that but should at least silence the warning by either writing a test or putting the placeholders in the test repo or else all subsequent PRs to this repo would fail this check. |
So, two issues that are a gap from where we are today: No remediationsThis rule fires an alert, but despite the description of the remediation being pretty simple, we have no way to actually perform the remediation, because it involves:
Incomplete checks and remediationThis only does step 1 of the instructions.
I'm not sure how we'd do steps 3 & 4 to fill out the actual policy, assuming that Step Security provided an API for reading these recommendations. We'd run into both the problems from "no remediations" as well as not having a way to fetch the output. |
this adds a rule that verifies that the
harden-runner
action is partof the first step of each workflow.
To test, you may call it as part of a profile that looks as follows:
Signed-off-by: Juan Antonio Osorio [email protected]