step-security/dynamodb-actions
Secure drop-in replacement for mooyoul/dynamodb-actions
Integrate Github Action with Amazon DynamoDB.
GitHub Actions security score comparison
| step-security/dynamodb-actions | mooyoul/dynamodb-actions | |
|---|---|---|
Score | 10/10 | 0/10 |
License | MIT License | |
Maintained | Maintained by StepSecurity | |
Vulnerabilities | 0 existing vulnerabilities detected | |
Docker vulnerabilities | docker://ghcr.io/step-security/dynamodb-actions:v1.2.6@sha256:4364cfae309de32068f3b4b16918e93c9758c4583e3df7e6f8e2f6af8d74707d (6 existing vulnerabilities detected) | node:lts-alpine (6 existing vulnerabilities detected) |
Branch protection | Branch protection is maximal on development and all release branches | |
Manual code review | Upstream changes are reviewed before merging | - |
Secure publishing | Reproducible builds with SBOM and provenance | - |
Signed commits | All commits are signed | - |
Automated security tools | Findings from tools are triaged and fixed before each change | - |
Popular | Used by StepSecurity enterprise customers | Used by 5 open-source projects |
Security Policy | security policy file detected | security policy file not detected |
Networking Behavior of step-security/dynamodb-actions
This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
| Network Destination | Owner |
|---|---|
| dynamodb.us-west-2.amazonaws.com | Unknown |