Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automatic security check information on each Actions listing #774

Closed
github-product-roadmap opened this issue May 10, 2023 · 2 comments
Closed
Labels
actions Feature: GitHub Actions all Product SKU: All exploring Feature phase: Exploring preview Feature phase: Preview

Comments

@github-product-roadmap
Copy link
Collaborator

Summary

Today, there is no way for consumer of individual actions to determine its trustworthiness and quality, other than analyzing whether it comes from a verified creator. Enterprises have been asking for actions that follow standards (e.g: CodeQL, timely dependency updates, etc.).

When this work is complete, we will automatically run checks on repositories hosting published Actions to determine if the repository where the Action is hosted follows security best practices. We use a subset of OpenSSF (Open Source Security Foundation) scorecard checks to make this determination and publish that metadata as part of the Action listing page and details.

Intended Outcome

We are building this to continue our credibility with customers that GitHub is serious about security. With 17K actions on the Marketplace and more getting added every day, it's imperative that we surface the necessary metadata for consumers to be able to make decisions about what actions they can rely on.

How will it work?

Whenever there's a state change in a repository (based on certain rules) a dynamic workflow is kicked off to run the checks. The results from the scoring are then surfaced on to the listing page. Since it's a new change, once we go GA, we will give action creators a grace period to make any desired changes, after which the results will be automatically published to the listing details page. New actions authored and published after the GA date will automatically get graded.

These checks against a repository that's hosting the action will evaluate holistic security practices, source risk assessment and build risk assessment.

@github github locked and limited conversation to collaborators May 10, 2023
@github-product-roadmap github-product-roadmap added actions Feature: GitHub Actions all Product SKU: All preview Feature phase: Preview exploring Feature phase: Exploring labels May 10, 2023
@ankneis ankneis moved this to Future in GitHub Public Roadmap May 10, 2023
@ankneis
Copy link
Collaborator

ankneis commented Nov 20, 2024

This issue is being closed as outdated. For more information, please check out this Discussion post. Stay tuned for new additions to our refreshed public roadmap!

@ankneis ankneis closed this as not planned Won't fix, can't repro, duplicate, stale Nov 20, 2024
@ankneis
Copy link
Collaborator

ankneis commented Dec 6, 2024

We wanted to provide more details on why we removed this from the roadmap. We're continuing to invest in the security of the Actions ecosystem, and giving publishers and consumers tools to verify and attest to the source of workflows and artifacts created with them.

Currently, we are prioritizing investments into Immutable Actions (#592), release and artifact attestations. We're removing this change from the roadmap for now while we focus our investment into those areas.

If you’re interested in this feature, please share your feedback in the GitHub community so we can track interest and consider it in the future.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
actions Feature: GitHub Actions all Product SKU: All exploring Feature phase: Exploring preview Feature phase: Preview
Projects
Status: Future
Development

No branches or pull requests

2 participants