Skip to content

CI actions and container images use mutable tags instead of pinned digests #355

@raballew

Description

@raballew

Description

GitHub Actions across workflow files use mutable tags (@v4, @v3, @v6) instead of commit SHA pins. A compromised upstream action repository can silently inject malicious code into the CI pipeline.

The same pattern applies to container images:

  • secrets-job.yaml:24 uses quay.io/jumpstarter-dev/jumpstarter-utils:latest without digest pinning
  • Flasher driver hardcodes :latest OCI bundles at jumpstarter_driver_flashers/driver.py:19

SLSA attestation (attest-build-provenance@v1) exists but verification is consumer-opt-in.

Suggested Fix

  • Pin GitHub Actions to commit SHA digests
  • Add Dependabot configuration for GitHub Actions updates
  • Pin container images by digest

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions