Closed joycebrum closed 11 months ago
Hello! Doing a follow up here on behalf of Joyce. If you agree on making a few changes to hash pin dependencies, let me know, I can support you by opening a PR! Otherwise, we can close the issue as not planned. I'll wait 2 more months.
I am open to adopting the suggestions, but getting to implement them will take some more time. I'll happy to review the PRs in the meantime.
Description
Hi @manugarg,
I would like to suggest another security practice recommended by the OpenSSF Scorecard which is to hash pin dependencies to prevent dependency-confusion, typosquatting and tag renaming attacks.
The change would only be applied to GitHub workflows, dockerfiles and shell scripts dependencies.
This means:
Along with hash-pinning dependencies, I also recommend adopting dependabot or renovatebot to help keep the dependencies up to date. Both tools can update hashes and associated semantic version comments.
I can submit one PR for each type of change above to be easier to review if you prefer. Just let me know if that's the case.
Let me know if you are open to evaluate these changes and I'll submit the PR(s) ASAP. Also let me know if you rather use dependabot or renovatebot. I can also help on providing comparison information about them.
Any questions or concerns just let me know.
Thanks! Joyce
Additional Context
A tag renaming attack is a type of attack whereby an attacker:
A dependency-confusion attack occurs when an attacker: