You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix OpenSSF Scorecard security issues in all workflows
Apply security best practices across all 11 GitHub Actions workflow files:
- Add SPDX-License-Identifier headers (AGPL-3.0-or-later)
- Add workflow-level `permissions: read-all` for least privilege
- Add job-level permissions (contents: read, security-events: write where needed)
- Pin all GitHub Actions to SHA hashes with version comments for supply chain security
Actions pinned:
- actions/checkout@b4ffde6 # v4.1.1
- github/codeql-action/*@662472033e021d55d94146f66f6058822b0b39fd # v3.28.1
- ossf/scorecard-action@62b2cac # v2.4.0
- trufflesecurity/trufflehog@8a8ef85 # v3.88.3
This addresses the Token-Permissions and Pinned-Dependencies checks from
OpenSSF Scorecard for improved security posture.
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
0 commit comments