TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: harden-runner: GitHub Action to prevent software supply chain attacks

11 点作者 varunsharma07大约 3 年前

2 条评论

varunsharma07大约 3 年前
Most of the times compromised dependencies and build tools make outbound requests. This GitHub Action monitors the GitHub-hosted runner for outbound requests and allows setting a policy to block based on allowed endpoints.<p>More details at: Introducing Harden-Runner: GitHub Action to prevent supply chain attacks: <a href="https:&#x2F;&#x2F;blog.stepsecurity.io&#x2F;introducing-harden-runner-github-action-to-prevent-supply-chain-attacks-91a030b67a77" rel="nofollow">https:&#x2F;&#x2F;blog.stepsecurity.io&#x2F;introducing-harden-runner-githu...</a>
theamk大约 3 年前
Bypass idea 1: exfiltrate data to known hosts. For example, &quot;github.com&quot; is likely whitelisted - so post stolen credentials as an issue comment in a little-known repository? Or maybe push the stolen data to some repo?<p>Bypass idea 2: before exfiltrating data, stop (or somehow mess with) the agent. After all, both github actions and user code have the same permissions on the runner.
评论 #30506237 未加载