Skip to content

CI security: hash-pin all action references? #1089

@woodruffw

Description

@woodruffw

Problem:

I'm opening this up pro forma, since the PR template expects an issue. It doesn't quite fit into the existing issue templates, so apologies 🙂

(I'm opening a PR to accompany this issue shortly after.)

Relevant details

aws-lc-rc's GitHub Actions workflows currently make extensive use of third-party actions via mutable pointers, i.e. tags and branches. This represents a supply chain risk, as a compromise of any of these third-party actions (via their repo) can allow an attacker to update these pointers to malicious contents.

The solution is to hash-pin all action references. This in effect replaces a mutable reference (a symbolic Git ref) with an immutable one (a sha ref). GitHub's own tooling (Dependabot, etc.) can maintain these hash-references and keep them updated, along with their sidecar comments.

For more information/context:

Separately, the "why" behind this issue is that I'm an employee of Astral, and I'm looking to eliminate risks (even very minor) ones in our downstream dependencies for tools like uv. aws-lc-rs is one such dependency 🙂

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions