@@ -24,15 +24,25 @@ jobs:
24
24
- name : Harden Runner
25
25
uses : step-security/harden-runner@ebacdc22ef6c2cfb85ee5ded8f2e640f4c776dd5 # v2.0.0
26
26
with :
27
- egress-policy : audit # TODO: change to 'egress-policy: block' after couple of runs
27
+ disable-sudo : true
28
+ egress-policy : block
29
+ allowed-endpoints : >
30
+ api.github.com:443
31
+ api.osv.dev:443
32
+ api.securityscorecards.dev:443
33
+ bestpractices.coreinfrastructure.org:443
34
+ fulcio.sigstore.dev:443
35
+ github.com:443
36
+ rekor.sigstore.dev:443
37
+ sigstore-tuf-root.storage.googleapis.com:443
28
38
29
39
- name : " Checkout code"
30
- uses : actions/checkout@2541b1294d2704b0964813337f33b291d3f8596b # v3.0.2
40
+ uses : actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
31
41
with :
32
42
persist-credentials : false
33
43
34
44
- name : " Run analysis"
35
- uses : ossf/scorecard-action@99c53751e09b9529366343771cc321ec74e9bd3d # v2.0.6
45
+ uses : ossf/scorecard-action@e38b1902ae4f44df626f11ba0734b14fb91f8f86 # v2.1.2
36
46
with :
37
47
results_file : results.sarif
38
48
results_format : sarif
@@ -51,14 +61,14 @@ jobs:
51
61
# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
52
62
# format to the repository Actions tab.
53
63
- name : " Upload artifact"
54
- uses : actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0
64
+ uses : actions/upload-artifact@0b7f8abb1508181956e8e162db84b466c27e18ce # v3.1.2
55
65
with :
56
66
name : SARIF file
57
67
path : results.sarif
58
68
retention-days : 5
59
69
60
70
# Upload the results to GitHub's code scanning dashboard.
61
71
- name : " Upload to code-scanning"
62
- uses : github/codeql-action/upload-sarif@c7f292ea4f542c473194b33813ccd4c207a6c725 # v2.1.21
72
+ uses : github/codeql-action/upload-sarif@959cbb7472c4d4ad70cdfe6f4976053fe48ab394 # v2.1.37
63
73
with :
64
74
sarif_file : results.sarif
0 commit comments