actions/attest-sbom
Action for generating SBOM attestations for workflow artifacts
GitHub Actions security score
actions/attest-sbom | |
---|---|
Score | 7/10 |
License | MIT License |
Maintained | 12 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10 |
Vulnerabilities | 4 existing vulnerabilities detected |
Branch protection | branch protection is not maximal on development and all release branches |
Manual code review | - |
Secure publishing | - |
Signed commits | - |
Automated security tools | - |
Popular | Used by 102 open-source projects |
Security Policy | security policy file detected |
Networking Behavior of actions/attest-sbom
This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
Popular DestinationUnknown Destination
Network Destination | Owner |
---|---|
fulcio.sigstore.dev | |
rekor.sigstore.dev | |
api.github.com | ![]() |
auth.docker.io | |
index.docker.io | |
production.cloudflare.docker.com | |
quay.io | Unknown |
ghcr.io | ![]() |
registry-1.docker.io | |
github.com | ![]() |
docker-images-prod.6aa30f8b08e16409b46e0173d6de2f56.r2.cloudflarestorage.com |