Skip to content

Security: codfish/actions

Security

SECURITY.md

Security Policy

Table of Contents

Supported Versions

This project follows a rolling release model. We provide security updates for:

Version Supported
main βœ… Always supported
Latest release tags βœ… Supported
Older releases ❌ Not supported

Reporting a Vulnerability

If you discover a security issue, please follow these steps:

πŸ”’ Private Disclosure

Do NOT create a public issue for security vulnerabilities.

Instead, please report security issues privately using one of these methods:

  1. GitHub Security Advisories (preferred)

    • Go to the Security tab
    • Click "Report a vulnerability"
    • Fill out the form with details
  2. Email

πŸ“‹ What to Include

When reporting a vulnerability, please include:

  • Description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact of the vulnerability
  • Suggested fix (if you have one)
  • Your contact information for follow-up

πŸ• Response Timeline

We aim to respond to security reports within:

  • Initial response: 24-48 hours
  • Confirmation/triage: 2-5 business days
  • Resolution: Varies based on complexity

Security Best Practices for Users

When using these GitHub Actions in your workflows:

πŸ” Secrets Management

  • Never log secrets in workflows that use these actions
  • Use GitHub Secrets for sensitive information
  • Limit secret scope to only necessary workflows
  • Rotate secrets regularly
# βœ… Good - Using secrets properly
- uses: codfish/actions/npm-pr-version@v2
  with:
    npm-token: ${{ secrets.NPM_TOKEN }}
    github-token: ${{ secrets.GITHUB_TOKEN }}

# ❌ Bad - Exposing secrets
- name: Debug
  run: echo "Token: ${{ secrets.NPM_TOKEN }}"

🏷️ Action Versioning

  • Pin to specific versions or commit hashes for production workflows
  • Avoid using @main in production (use for testing only)
# βœ… Good - Pinned version
- uses: codfish/actions/setup-node-and-install@v2.2.3

# ⚠️ Caution - Latest main (testing only)
- uses: codfish/actions/setup-node-and-install@main

πŸ” Workflow Permissions

  • Use minimal permissions required
  • Specify explicit permissions when possible
  • Avoid using write-all permissions
# βœ… Good - Minimal permissions
permissions:
  contents: read
  issues: write
  pull-requests: write

# ❌ Bad - Excessive permissions
permissions: write-all

πŸ›‘οΈ Input Validation

  • Validate user inputs before using them in actions
  • Sanitize outputs when displaying them
  • Be cautious with dynamic expressions

Security Features

This project implements several security measures:

πŸ”’ Automated Security Scanning

  • Dependabot for dependency updates
  • CodeQL for static analysis
  • Dependency Review for PR security checks
  • Secret scanning with TruffleHog
  • npm audit for vulnerability detection

πŸ›‘οΈ Secure Development Practices

  • Input validation in all actions
  • Error handling without information disclosure
  • No secret logging in any action
  • Least privilege principle in action permissions

πŸ” Supply Chain Security

  • Minimal dependencies to reduce attack surface
  • Regular dependency updates via Dependabot
  • Verified action references in workflows

Known Security Considerations

GitHub Actions Environment

  • Actions run in GitHub's infrastructure - we cannot control the runner environment
  • Secrets are available to all steps in a job that has access
  • Workflow logs are visible to users with read access to the repository

npm Publishing (npm-pr-version)

  • NPM tokens have broad permissions - ensure tokens are scoped appropriately
  • Published packages are public by default - review package contents
  • Version immutability - published versions cannot be unpublished

Comment Actions

  • GitHub tokens can comment on behalf of the workflow user
  • Comment content is public - avoid including sensitive information
  • Rate limiting applies - excessive commenting may be throttled

Incident Response

In case of a confirmed security vulnerability:

  1. Assessment - Evaluate severity and impact
  2. Mitigation - Develop and test fixes
  3. Disclosure - Coordinate with reporter on disclosure timeline
  4. Release - Deploy security fixes
  5. Communication - Notify users through appropriate channels

Security Contact

Acknowledgments

We appreciate security researchers and users who responsibly disclose vulnerabilities. Contributors who report valid security issues will be acknowledged (with permission) in:

  • Security advisories
  • Release notes
  • This security policy

Thank you for helping keep this project secure! πŸ”’

There aren’t any published security advisories