feat: pin GitHub Actions to SHA hashes and add security linters#5
Merged
mpartipilo merged 2 commits intomainfrom Apr 1, 2026
Merged
feat: pin GitHub Actions to SHA hashes and add security linters#5mpartipilo merged 2 commits intomainfrom
mpartipilo merged 2 commits intomainfrom
Conversation
Prevent supply chain attacks by replacing mutable tag references with immutable commit SHAs across all workflow files. Add CI linter to enforce SHA pinning and a PR security workflow to detect hidden Unicode characters (trojan-source prevention). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
There was a problem hiding this comment.
Orca Security Scan Summary
| Status | Check | Issues by priority | |
|---|---|---|---|
| Infrastructure as Code | View in Orca | ||
| SAST | View in Orca | ||
| Secrets | View in Orca | ||
| Vulnerabilities | View in Orca |
Summary - Weaviate C# Client CoverageSummary
CoverageWeaviate.Client.Managed - 49.7%
|
- Narrow +++ exclusion to only match real diff headers, preventing attackers from evading scanning with +++prefixed lines - Escape filenames in GitHub Actions annotations to prevent command injection via crafted PR filenames - Add git ref validation with clear error on missing refs - Add pull-requests: read permission required by gh pr diff Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
tools/linter_actions_pinned.shas a CI step in the preflight job to enforce SHA pinning going forwardtools/linter_hidden_unicode.shand apull_request_targetworkflow to detect hidden/invisible Unicode characters in PR diffs (trojan-source prevention)Motivation
Mutable tags can be moved to point at malicious commits — this happened in practice with
tj-actions/changed-files(CVE-2025-30066). SHA pinning makes this impossible. The hidden Unicode linter guards against trojan-source attacks where invisible characters manipulate code rendering.Based on patterns from weaviate/weaviate#10907 and weaviate/weaviate#10909.
Test plan
bash tools/linter_actions_pinned.shpasses locally (all actions verified as SHA-pinned)linter_hidden_unicode.sh --stdincorrectly detects zero-width space (U+200B) in test inputlinter_hidden_unicode.sh --stdinpasses clean input without false positives🤖 Generated with Claude Code