diff --git a/.github/workflows/deploy.yml b/.github/workflows/deploy.yml index 04f85ec..f3e7b11 100644 --- a/.github/workflows/deploy.yml +++ b/.github/workflows/deploy.yml @@ -24,7 +24,7 @@ jobs: actions: read # Allow cache restore without high-privilege write access steps: - name: Harden Runner - uses: step-security/harden-runner@58077d3c7e43986b6b15fba718e8ea69e387dfcc # v2.15.1 + uses: step-security/harden-runner@fa2e9d605c4eeb9fcad4c99c224cee0c6c7f3594 # v2.16.0 with: egress-policy: audit @@ -56,7 +56,7 @@ jobs: contents: read steps: - name: Harden Runner - uses: step-security/harden-runner@58077d3c7e43986b6b15fba718e8ea69e387dfcc # v2.15.1 + uses: step-security/harden-runner@fa2e9d605c4eeb9fcad4c99c224cee0c6c7f3594 # v2.16.0 with: egress-policy: audit @@ -75,7 +75,7 @@ jobs: run: npm run build - name: Run Lighthouse CI (desktop) - uses: treosh/lighthouse-ci-action@fcd65974f7c4c2bf0ee9d09b84d2489183c29726 # v12.6.1 + uses: treosh/lighthouse-ci-action@3e7e23fb74242897f95c0ba9cabad3d0227b9b18 # v12.6.2 with: configPath: ./lighthouserc.json uploadArtifacts: true @@ -83,7 +83,7 @@ jobs: artifactName: lighthouse-results-desktop - name: Run Lighthouse CI (mobile) - uses: treosh/lighthouse-ci-action@fcd65974f7c4c2bf0ee9d09b84d2489183c29726 # v12.6.1 + uses: treosh/lighthouse-ci-action@3e7e23fb74242897f95c0ba9cabad3d0227b9b18 # v12.6.2 with: configPath: ./lighthouserc.mobile.json uploadArtifacts: true @@ -107,7 +107,7 @@ jobs: steps: # 🛡️ HARDEN RUNNER: Monitor network traffic - name: Harden Runner - uses: step-security/harden-runner@58077d3c7e43986b6b15fba718e8ea69e387dfcc # v2.15.1 + uses: step-security/harden-runner@fa2e9d605c4eeb9fcad4c99c224cee0c6c7f3594 # v2.16.0 with: egress-policy: audit @@ -116,7 +116,7 @@ jobs: # 🔍 TRIVY: Scan for known vulnerabilities in dependencies - name: Run Trivy Vulnerability Scanner - uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # v0.34.2 + uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 with: scan-type: 'fs' ignore-unfixed: true @@ -148,7 +148,7 @@ jobs: image: ${{ steps.image.outputs.image }} steps: - name: Harden Runner - uses: step-security/harden-runner@58077d3c7e43986b6b15fba718e8ea69e387dfcc # v2.15.1 + uses: step-security/harden-runner@fa2e9d605c4eeb9fcad4c99c224cee0c6c7f3594 # v2.16.0 with: egress-policy: audit @@ -206,7 +206,7 @@ jobs: # Install cosign - name: Install cosign - uses: sigstore/cosign-installer@faadad0cce49287aee09b3a48701e75088a2c6ad # v4.0.0 + uses: sigstore/cosign-installer@ba7bc0a3fef59531c69a25acd34668d6d3fe6f22 # v4.1.0 # Initialize Sigstore with latest TUF root - name: Initialize Sigstore @@ -220,7 +220,7 @@ jobs: # 📦 GENERATE SBOM - name: Generate SBOM - uses: anchore/sbom-action@17ae1740179002c89186b61233e0f892c3118b11 # v0.23.0 + uses: anchore/sbom-action@57aae528053a48a3f6235f2d9461b05fbcb7366d # v0.23.1 with: image: ${{ steps.image.outputs.image }} format: cyclonedx-json