Categories

Subscribe to Feed

Latest Posts

Showing 0 Items

Export Harden-Runner Security Insights and Detections to Amazon S3

Send Harden-Runner insights and detections to Amazon S3 for centralized analysis, long-term storage, and seamless integration with your security tools

Evolving Harden-Runner’s disable-sudo Policy for Improved Runner Security

This post details a vulnerability to bypass Harden-Runner’s disable-sudo policy, the assigned CVE, and the steps we’ve taken to mitigate and detect it.

Announcing Policy-Driven Automated Pull Requests for CI/CD Misconfiguration Remediation

Strengthen CI/CD security with policy-driven automated pull requests. Automatically remediate misconfigurations in your GitHub Action workflows.

reviewdog GitHub Actions are compromised

The supply chain compromise of reviewdog GitHub Actions has been resolved. This post summarizes the incident, how it was discovered, and what you should do to protect your workflows

Harden-Runner detection: tj-actions/changed-files action is compromised

We have concluded our investigation into the tj-actions/changed-files compromise. This post explains how the attack worked, how we detected it, and what steps you should take to secure your CI/CD environment.

Announcing StepSecurity’s Integration with RunsOn: Secure and Optimized CI/CD Pipelines

We’re excited to announce our integration with RunsOn, the modern way to self-host GitHub Actions runners at scale on AWS, with incredible cost savings and advanced features. With this partnership, StepSecurity Harden-Runner now seamlessly integrates with RunsOn, providing enhanced security and visibility for CI/CD pipelines.

Secure Repo Just Got Better: New Features for GitHub Actions Security Best Practices

The updates include support for pinning GitHub’s New Immutable Actions, exemptions for pinning specific GitHub Actions, and configuring preferences to use across multiple repositories.

Why Compliance Auditors Are Looking at Your CI/CD Runners - And How to Prepare

Despite the sensitive roles CI/CD runners play (accessing source code, secrets, and deployment systems), compliance requirements often don’t explicitly call them out. As a result, security teams may focus on traditional servers and endpoints, while build runners go unmonitored. This blog will explain why that is changing.

There are no blog posts matching your criteria at this time.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.