Public repositories are visible to everyone on the internet and typically host open-source code. Private repositories are only accessible to specific users and typically host proprietary code
Harden-Runner can block traffic to remote endpoints that have not been explicitly authorized. This stops attackers from stealing credentials and sensitive data
Harden-Runner monitors the behavior of build tools and dependencies. It flags deviations in baseline.
CI/CD jobs typically don't overwrite source code, this is a potential indicator of compromise. Malicious source code overwrites have caused major supply chain security breaches in the past.
Sudo allows the user to delegate privileges to run commands as a root or another user. Harden-Runner can disable sudo access in CI/CD
For each GitHub Actions workflow run, Harden-Runner monitors run-time network, file, and process events and makes runtime insights available via the StepSecurity Web App.
Harden-Runner can send important runtime CI/CD events to Slack and email workflow execution logs.
Support channel to engage with the StepSecurity team
It is based on the number of GitHub users who have made contributions to source code in the past one month.
Follow these step by step instructions to enable Harden Runner for private repositories.
You can terminate your subscriptions anytime by sending us an email at info@stepsecurity.io.
Please use the 'Contact Us' option in the 'Useful Links' section below. You can also send an email to info@stepsecurity.io.