step-security/action-semantic-pull-request
Secure drop-in replacement for amannn/action-semantic-pull-request
GitHub Action that ensures that your PR title matches the Conventional Commits spec
GitHub Actions security score comparison
step-security/action-semantic-pull-request | amannn/action-semantic-pull-request | |
---|---|---|
Score | 10/10 | 4/10 |
License | MIT License | MIT License |
Maintained | Maintained by StepSecurity | 0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0 |
Vulnerabilities | 0 existing vulnerabilities detected | 7 existing vulnerabilities detected |
Branch protection | Branch protection is maximal on development and all release branches | branch protection not enabled on development/release branches |
Manual code review | Upstream changes are reviewed before merging | - |
Secure publishing | Reproducible builds with SBOM and provenance | - |
Signed commits | All commits are signed | - |
Automated security tools | Findings from tools are triaged and fixed before each change | - |
Popular | Used by StepSecurity enterprise customers | Used by 1140 open-source projects |
Security Policy | security policy file detected | security policy file not detected |
Networking Behavior of step-security/action-semantic-pull-request
This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
Network Destination | Owner |
---|---|
api.github.com | ![]() |