GitHub is enhancing its security measures for GitHub Actions and the npm ecosystem to combat rising supply chain attacks aimed at exfiltrating secrets and distributing malicious software packages.
Key Points
- GitHub recommends enabling CodeQL to scan workflows for security vulnerabilities and pinning third-party actions to full-length commit SHAs.
- Developers are encouraged to replace static secrets with OpenID Connect tokens to authorize activities via trusted publishing.
- Trusted publishing is now supported across major package repositories, including npm, PyPI, NuGet, RubyGems, and Crates.
- GitHub actively scans over 30,000 npm packages daily for malware, utilizing human review to confirm detections and minimize false positives.
- The company is accelerating its security roadmap for GitHub Actions in response to recent supply chain threats and evolving malware campaigns.