Skip to content

[StepSecurity] Apply security best practices#1

Open
stepsecurity-app[bot] wants to merge 1 commit into
masterfrom
chore/GHA-132101-stepsecurity-remediation
Open

[StepSecurity] Apply security best practices#1
stepsecurity-app[bot] wants to merge 1 commit into
masterfrom
chore/GHA-132101-stepsecurity-remediation

Conversation

@stepsecurity-app
Copy link
Copy Markdown

@stepsecurity-app stepsecurity-app Bot commented May 13, 2026

Summary

This pull request has been generated by StepSecurity as part of your enterprise subscription to ensure compliance with recommended security best practices. Please review and merge the pull request to apply these security enhancements.

Security Fixes

Harden Runner

Harden-Runner is an open-source security agent for the GitHub-hosted runner to prevent software supply chain attacks. It prevents exfiltration of credentials, detects tampering of source code during build, and enables running jobs without sudo access.

Feedback

For bug reports, feature requests, and general feedback; please create an issue in step-security/secure-repo or contact us via our website.


Note

Medium Risk
Touches many GitHub Actions workflows by adding a new third-party step-security/harden-runner step that depends on STEP_SECURITY_API_KEY; misconfiguration or secret availability could cause CI/automation failures.

Overview
Adds a new “Harden the runner” step (pinned step-security/harden-runner@v2.19.1) to a broad set of GitHub Actions workflows (CI builds/tests, CodeQL, and repo automation like stale issues/labeling) and configures it to use the StepSecurity policy store via STEP_SECURITY_API_KEY.

No application code changes; this is an infrastructure/security update that runs before existing workflow steps.

Reviewed by Cursor Bugbot for commit 1983747. Bugbot is set up for automated code reviews on this repo. Configure here.

Signed-off-by: StepSecurity Bot <bot@stepsecurity.io>
Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Fix All in Cursor

❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, have a team admin enable autofix in the Cursor dashboard.

Reviewed by Cursor Bugbot for commit 1983747. Configure here.

uses: step-security/harden-runner@a5ad31d6a139d249332a2605b85202e8c0b78450 # v2.19.1
with:
use-policy-store: true
api-key: ${{ secrets.STEP_SECURITY_API_KEY }}
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Harden-runner may break CI for fork pull requests

Medium Severity

Several workflows (like api-surface-area-review-verification.yml, changelog-verification.yml, new-module-verification.yml, codeql.yml) trigger on pull_request and previously required no secrets. The newly added harden-runner step uses use-policy-store: true with api-key: ${{ secrets.STEP_SECURITY_API_KEY }}, but GitHub Actions does not provide secrets for pull_request events from forks. The harden-runner docs state the API key is "required when use-policy-store is set to true," so this step may fail with an empty key, breaking CI for all external contributors to this public open-source project.

Additional Locations (2)
Fix in Cursor Fix in Web

Reviewed by Cursor Bugbot for commit 1983747. Configure here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants