Back to all reviewers

Pin CI dependencies securely

ant-design/ant-design
Based on 2 comments
Yaml

Always pin CI/CD dependencies (GitHub Actions, external tools) to specific commit hashes or exact versions rather than using floating tags like @v1 or @latest. This prevents supply chain attacks and ensures reproducible builds. However, pinned dependencies must be regularly updated to avoid using outdated or vulnerable versions.

CI/CD Yaml

Reviewer Prompt

Always pin CI/CD dependencies (GitHub Actions, external tools) to specific commit hashes or exact versions rather than using floating tags like @v1 or @latest. This prevents supply chain attacks and ensures reproducible builds. However, pinned dependencies must be regularly updated to avoid using outdated or vulnerable versions.

For GitHub Actions, use commit hashes with descriptive comments:

- name: verify-version
  uses: actions-cool/verify-files-modify@82e88fd0e8e5ed5b7f1a9e6a3c4b9c2d1234567 # pin to latest verified commit

When implementing automated dependency updates, ensure proper token permissions are configured so that generated PRs can run CI checks. This allows safe validation of dependency changes before merging. Consider using tokens with minimal required permissions rather than default tokens to maintain security while enabling necessary CI functionality.

2
Comments Analyzed
Yaml
Primary Language
CI/CD
Category

Source Discussions