TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Protect Your CI/CD from SolarWinds-Type Attacks with This Agent

15 点作者 varunsharma07超过 2 年前
Hello HN, my name is Varun, and I am the co-founder of StepSecurity. Here is the backstory about Harden-Runner. We thoroughly researched past software supply chain security incidents. The devastating breaches of SolarWinds, Codecov, and others, have one thing in common – they attacked the CI&#x2F; CD pipeline or the build server.<p>These incidents made it clear that a purpose-built security agent was needed for CI&#x2F; CD. While there are numerous agents available for desktops and servers, such as from CrowdStrike and Lacework, none have been tailored specifically to address the unique risks present in CI&#x2F;CD pipelines.<p>With the understanding that a specialized solution was needed to secure CI&#x2F;CD environments, we developed Harden-Runner, an open-source solution tailored specifically for GitHub Actions hosted runners. It can be seamlessly integrated into your workflow by simply adding a step. The agent installation process is also lightning-fast, taking no more than 5 seconds to complete.<p>Harden-Runner&#x27;s security agent is designed to closely monitor all aspects of the workflow run, including DNS, network, file, and process events. This allows for real-time identification of any potential security breaches. To prevent incidents like the Codecov breach, where exfiltration of credentials occurred, Harden-Runner allows you to set policies that restrict outbound traffic at both the DNS and network layers. Additionally, we are actively working on implementing further restrictions at the application layer, such as using HTTP verbs and paths, to provide an even more comprehensive security solution.<p>An excellent example of how Harden-Runner effectively blocks outbound traffic can be found in the following link: <a href="https:&#x2F;&#x2F;app.stepsecurity.io&#x2F;github&#x2F;microsoft&#x2F;msquic&#x2F;actions&#x2F;runs&#x2F;3949103502" rel="nofollow">https:&#x2F;&#x2F;app.stepsecurity.io&#x2F;github&#x2F;microsoft&#x2F;msquic&#x2F;actions&#x2F;...</a>. As you can see, all traffic to unauthorized endpoints is highlighted in red, indicating that it has been blocked; this is because these endpoints are not included in the allowed list defined in the GitHub Actions workflow file, which can be viewed here: <a href="https:&#x2F;&#x2F;github.com&#x2F;microsoft&#x2F;msquic&#x2F;blob&#x2F;aaecb0fac5a3902dd244df8a05942ffc35a6729f&#x2F;.github&#x2F;workflows&#x2F;cargo.yml#L23">https:&#x2F;&#x2F;github.com&#x2F;microsoft&#x2F;msquic&#x2F;blob&#x2F;aaecb0fac5a3902dd24...</a>.<p>One of the key features of Harden-Runner&#x27;s monitoring capabilities is its ability to detect any tampering or alteration of files during the build process, similar to the SolarWinds incident. To further enhance security and protect against potential malicious tools or attempts to disable the agent, Harden-Runner includes a disable-sudo mode. This mode effectively disables the use of &#x27;sudo&#x27; on the hosted runner, providing an additional layer of protection<p>Harden-Runner has already been adopted by over 600 open-source repositories: <a href="https:&#x2F;&#x2F;github.com&#x2F;step-security&#x2F;harden-runner&#x2F;network&#x2F;dependents">https:&#x2F;&#x2F;github.com&#x2F;step-security&#x2F;harden-runner&#x2F;network&#x2F;depen...</a>. To fully understand the capabilities of Harden-Runner and how it can protect against past supply chain attacks, please try out our attack simulator GitHub repository at <a href="https:&#x2F;&#x2F;github.com&#x2F;step-security&#x2F;attack-simulator">https:&#x2F;&#x2F;github.com&#x2F;step-security&#x2F;attack-simulator</a>. I would love to hear your feedback.

1 comment

anomaliy超过 2 年前
Dig the example of blocking outbound traffic!
评论 #34524551 未加载