Skip to content

Commit cbc8e37

Browse files
authored
Add GitHub Actions Acceptable Use Violation Guide
This document outlines acceptable use policies and common violations for GitHub Actions workflows, including disallowed use cases, content restrictions, and security concerns.
1 parent 1c5b3bb commit cbc8e37

File tree

1 file changed

+140
-0
lines changed

1 file changed

+140
-0
lines changed

GITHUB_ACTIONS_ACCEPTABLE_USE.md

Lines changed: 140 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,140 @@
1+
# GitHub Actions Workflows — TOS / Acceptable Use Violation Guide
2+
3+
## Purpose
4+
5+
This document outlines common patterns, anti-patterns, and activities within GitHub Actions workflows that **can break GitHub’s Terms of Service (TOS)** or **Acceptable Use Policies (AUP)**. Violations can lead to:
6+
7+
- workflow termination by GitHub,
8+
- restriction or suspension of GitHub Actions,
9+
- repository disablement,
10+
- account suspension or termination.
11+
12+
This guidance supplements the official terms: GitHub Terms of Service, GitHub Terms for Additional Products, and GitHub Acceptable Use Policies. :contentReference[oaicite:1]{index=1}
13+
14+
---
15+
16+
## 1. Disallowed Workflow Use Cases
17+
18+
### ❌ Cryptomining or Other Unrelated Compute Tasks
19+
20+
Workflows must not be used for general computing tasks unrelated to repository software production, testing, deployment, or publication. Examples include:
21+
22+
- running cryptomining jobs in workflows. :contentReference[oaicite:2]{index=2}
23+
- serving general compute jobs not tied to the repo’s development lifecycle.
24+
25+
GitHub explicitly prohibits using Actions for high-burden compute services (e.g., as a general serverless platform). :contentReference[oaicite:3]{index=3}
26+
27+
---
28+
29+
### ❌ Unauthorized Access or Security Violations
30+
31+
Workflows must not perform activity that:
32+
33+
- attempts to disrupt or gain unauthorized access to devices, services, accounts, or networks outside authorized bug bounty programs; or
34+
- initiates attacks (e.g., scanning, exploitation, denial of service). :contentReference[oaicite:4]{index=4}
35+
36+
Workflows that include malicious scripts, malware, or code designed to breach systems are prohibited.
37+
38+
---
39+
40+
### ❌ Excessive or Abusive Automation
41+
42+
GitHub’s Acceptable Use Policies ban content and activity that:
43+
44+
- use the platform for excessive automated bulk activity;
45+
- place undue burden on GitHub’s infrastructure through automation. :contentReference[oaicite:5]{index=5}
46+
47+
Workflows that run on overly aggressive schedules, spawn thousands of concurrent jobs, or perform arbitrary network calls purely for automation strain GitHub resources.
48+
49+
---
50+
51+
### ❌ Spam, Inauthentic, or Misleading Content
52+
53+
Avoid workflows that:
54+
55+
- mass-generate notifications, issues, comments, or pull requests for spam purposes;
56+
- automate fake stars, forks, or bot activity to artificially inflate metrics;
57+
- publish promotions or solicitations that violate the AUP. :contentReference[oaicite:6]{index=6}
58+
59+
---
60+
61+
## 2. Content and Code Restrictions
62+
63+
### ❌ Publishing Unlawful Content
64+
65+
Workflows should not be used to upload or distribute illegal or harmful content via generated artifacts or repository commits, including:
66+
67+
- malware or exploit binaries as outputs of CI jobs; or
68+
- code explicitly meant to violate laws. :contentReference[oaicite:7]{index=7}
69+
70+
GitHub may remove such content and take account action.
71+
72+
---
73+
74+
### ❌ Intellectual Property Violations
75+
76+
Workflows that publish artifacts, binaries, or code that infringe copyright, trademark rights, or proprietary licenses are violations under the Acceptable Use Policies. :contentReference[oaicite:8]{index=8}
77+
78+
---
79+
80+
## 3. Workflow Security-Related Concerns (Operational Risks)
81+
82+
*Note: The following are **security best practices** but can also correlate to **policy violations if misused**.*
83+
84+
### ⚠️ Using Untrusted or Unsigned Actions
85+
86+
Workflows that reference unverified third-party actions (e.g., from unknown authors or with typo-squatted names) create security risks, which can lead to unintended malicious code execution. Though not a direct TOS clause, this **enables violations** when workflows execute harmful logic. :contentReference[oaicite:9]{index=9}
87+
88+
**Mitigation:**
89+
90+
- use verified actions or restrict allowed actions at the org level,
91+
- pin action versions to commit hashes or specific releases.
92+
93+
---
94+
95+
### ⚠️ Exposing Secrets
96+
97+
Workflows with insecure handling of secrets (e.g., printing them to logs, uploading them in public artifacts) can lead to compromise. While this is primarily a security issue, GitHub may take action if secrets are leaked at scale or used in harmful ways.
98+
99+
---
100+
101+
### ⚠️ Self-Hosted Runner Misconfiguration
102+
103+
Self-hosted runners exposed to untrusted code (e.g., in public fork PRs) can execute arbitrary code on internal infrastructure. Misconfigurations that lead to unauthorized access on private networks can trigger policy enforcement. :contentReference[oaicite:10]{index=10}
104+
105+
---
106+
107+
## 4. API and Tokens Misuse
108+
109+
- Abuse or excessive API usage (including workflow tokens and GitHub API clients) can lead to enforcement actions under API Terms and TOS. :contentReference[oaicite:11]{index=11}
110+
- Sharing API tokens to exceed rate limits is prohibited.
111+
112+
---
113+
114+
## 5. Consequences of Violations
115+
116+
GitHub’s policy enforcement actions may include:
117+
118+
- termination or disabling of offending workflows,
119+
- throttling or restricting GitHub Actions use,
120+
- disabling repositories created solely for TOS violations,
121+
- account suspension or termination. :contentReference[oaicite:12]{index=12}
122+
123+
---
124+
125+
## 6. Recommended Safe Practices
126+
127+
✔ Only run Actions directly related to the software’s build, test, deployment, or publishing.
128+
✔ Pin action versions to stable releases.
129+
✔ Restrict workflows from running on untrusted pull requests without approval.
130+
✔ Avoid metascheduling unrelated compute tasks.
131+
132+
---
133+
134+
## 7. References
135+
136+
- **GitHub Terms of Service & Acceptable Use Policies** — official source of usage restrictions. :contentReference[oaicite:13]{index=13}
137+
- **Additional Terms for GitHub Actions** — limitations on compute and prohibited uses. :contentReference[oaicite:14]{index=14}
138+
139+
---
140+

0 commit comments

Comments
 (0)