Summary
All third-party GitHub Actions in this repository's workflows are currently referenced by mutable version tags (e.g., actions/checkout@v4). This is a supply-chain security risk — tags can be force-pushed to point to malicious code.
Recommendation
Pin all third-party GitHub Actions to their full commit SHA while preserving the version in a comment for readability:
# Before (insecure)
uses: actions/checkout@v4
# After (secure)
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
Affected Files
.github/workflows/ci.yml
.github/workflows/npm-publish.yml
Actions Pinned
5 action references across 2 workflow file(s).
References
Summary
All third-party GitHub Actions in this repository's workflows are currently referenced by mutable version tags (e.g.,
actions/checkout@v4). This is a supply-chain security risk — tags can be force-pushed to point to malicious code.Recommendation
Pin all third-party GitHub Actions to their full commit SHA while preserving the version in a comment for readability:
Affected Files
.github/workflows/ci.yml.github/workflows/npm-publish.ymlActions Pinned
5 action references across 2 workflow file(s).
References