TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: harden-runner: GitHub Action to prevent software supply chain attacks

11 pointsby varunsharma07about 3 years ago

2 comments

varunsharma07about 3 years ago
Most of the times compromised dependencies and build tools make outbound requests. This GitHub Action monitors the GitHub-hosted runner for outbound requests and allows setting a policy to block based on allowed endpoints.<p>More details at: Introducing Harden-Runner: GitHub Action to prevent supply chain attacks: <a href="https:&#x2F;&#x2F;blog.stepsecurity.io&#x2F;introducing-harden-runner-github-action-to-prevent-supply-chain-attacks-91a030b67a77" rel="nofollow">https:&#x2F;&#x2F;blog.stepsecurity.io&#x2F;introducing-harden-runner-githu...</a>
theamkabout 3 years ago
Bypass idea 1: exfiltrate data to known hosts. For example, &quot;github.com&quot; is likely whitelisted - so post stolen credentials as an issue comment in a little-known repository? Or maybe push the stolen data to some repo?<p>Bypass idea 2: before exfiltrating data, stop (or somehow mess with) the agent. After all, both github actions and user code have the same permissions on the runner.
评论 #30506237 未加载