step-security/dynamodb-actions
Secure drop-in replacement for mooyoul/dynamodb-actions
Integrate Github Action with Amazon DynamoDB
GitHub Actions security score comparison
step-security/dynamodb-actions | mooyoul/dynamodb-actions | |
---|---|---|
Score | 10/10 | 2/10 |
License | MIT License | MIT License |
Maintained | Maintained by StepSecurity | 0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0 |
Vulnerabilities | 0 existing vulnerabilities detected | 34 existing vulnerabilities detected |
Docker vulnerabilities | node:lts-alpine 0 existing vulnerability detected | node:lts-alpine 0 existing vulnerability detected |
Branch protection | Branch protection is maximal on development and all release branches | branch protection not enabled on development/release branches |
Manual code review | Upstream changes are reviewed before merging | - |
Secure publishing | Reproducible builds with SBOM and provenance | - |
Signed commits | All commits are signed | - |
Automated security tools | Findings from tools are triaged and fixed before each change | - |
Popular | Used by StepSecurity enterprise customers | Used by 5 open-source projects |
Security Policy | security policy file detected | security policy file not detected |
Networking Behavior of step-security/dynamodb-actions
This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
Network Destination | Owner |
---|---|
dynamodb.us-west-2.amazonaws.com | Unknown |