Before using third-party actions, libraries, or dependencies that require access to sensitive data (tokens, secrets, credentials), conduct a thorough security audit. Third-party code, especially when source is obfuscated or built/compiled, poses significant security risks when granted access to sensitive resources.
Before using third-party actions, libraries, or dependencies that require access to sensitive data (tokens, secrets, credentials), conduct a thorough security audit. Third-party code, especially when source is obfuscated or built/compiled, poses significant security risks when granted access to sensitive resources.
Key evaluation steps:
Example from GitHub Actions:
# Instead of using third-party action with broad token
- uses: third-party/action@v1
with:
GITHUB_TOKEN: $
# Consider forking to your org or copying source code
- uses: your-org/forked-action@v1
with:
GITHUB_TOKEN: $
When in doubt, prioritize security over convenience by maintaining direct control over code that accesses sensitive resources.
Enter the URL of a public GitHub repository