hashicorp/setup-terraform
Sets up Terraform CLI in your GitHub Actions workflow.
GitHub Actions security score
| hashicorp/setup-terraform | |
|---|---|
Score | 9/10 |
License | Mozilla Public License 2.0 |
Maintained | 10 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 9 |
Vulnerabilities | 0 existing vulnerabilities detected |
Branch protection | branch protection is not maximal on development and all release branches |
Manual code review | - |
Secure publishing | - |
Signed commits | - |
Automated security tools | - |
Popular | Used by 3424 open-source projects |
Security Policy | security policy file detected |
Networking Behavior of hashicorp/setup-terraform
This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
Popular DestinationUnknown Destination
| Network Destination | Owner |
|---|---|
| releases.hashicorp.com | |
| pypi.org | |
| files.pythonhosted.org | |
| sum.golang.org | Unknown |
| gcr.io | Unknown |
| storage.googleapis.com | |
| checkpoint-api.hashicorp.com | Unknown |
| ip-ranges.amazonaws.com | Unknown |
| auth.docker.io | |
| production.cloudflare.docker.com | |
| repo.maven.apache.org | Unknown |
| registry.terraform.io | Unknown |
| github.com | |
| objects.githubusercontent.com | |
| stun3.l.google.com | Unknown |
| stun4.l.google.com | Unknown |
| stun2.l.google.com | Unknown |
| stun.l.google.com | Unknown |
| stun1.l.google.com | Unknown |
| registry-1.docker.io | |
| global.endpoint.security.microsoft.com | |
| x.cp.wd.microsoft.com | |
| wdcp.microsoft.com | |
| winatp-gw-cus.microsoft.com |