Skip to content

Harden CI against supply chain attacks#57

Open
Matt Perpick (clutchski) wants to merge 2 commits intomainfrom
matt/supply-chain
Open

Harden CI against supply chain attacks#57
Matt Perpick (clutchski) wants to merge 2 commits intomainfrom
matt/supply-chain

Conversation

@clutchski
Copy link
Copy Markdown
Contributor

Summary

  • P0: Replaced manual wget of goreleaser binary (no checksum verification) with the official goreleaser/goreleaser-action pinned to a commit hash
  • P1: Added govulncheck CI job using golang/govulncheck-action pinned to commit hash, runs on Go 1.24.x and gates the ci-passed check
  • P1: Added make vulncheck target for local vulnerability scanning (go mod verify was already covered by existing mod-verify target)

Test plan

  • Verify CI passes with the new vulncheck job
  • Verify release workflow still installs goreleaser correctly via the action
  • Run make vulncheck locally to confirm it works

🤖 Generated with Claude Code

Matt Perpick (clutchski) and others added 2 commits April 3, 2026 11:17
- Replace manual goreleaser wget (no checksum verification) with official
  goreleaser-action pinned to commit hash
- Add govulncheck CI job to scan for known vulnerabilities in dependencies
- Add make vulncheck target for local vulnerability scanning

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
The golang/govulncheck-action uses unpinned actions internally, which
violates the org policy requiring full SHA-pinned actions. Run
govulncheck via make target instead.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant