actions/attest-build-provenance
Action for generating build provenance attestations for workflow artifacts
GitHub Actions security score
actions/attest-build-provenance | |
---|---|
Score | 9/10 |
License | MIT License |
Maintained | 23 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10 |
Vulnerabilities | 2 existing vulnerabilities detected |
Branch protection | branch protection is not maximal on development and all release branches |
Manual code review | - |
Secure publishing | - |
Signed commits | - |
Automated security tools | - |
Popular | Used by 1664 open-source projects |
Security Policy | security policy file detected |
Networking Behavior of actions/attest-build-provenance
This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
Popular DestinationUnknown Destination
Network Destination | Owner |
---|---|
fulcio.sigstore.dev | |
rekor.sigstore.dev | |
api.github.com | ![]() |
index.docker.io | |
quay.io | Unknown |
ghcr.io | ![]() |
production.cloudflare.docker.com | |
auth.docker.io | |
registry-1.docker.io | |
github.com | ![]() |
fulcio.githubapp.com | Unknown |
timestamp.githubapp.com | Unknown |
docker-images-prod.6aa30f8b08e16409b46e0173d6de2f56.r2.cloudflarestorage.com |