step-security/wait-for-secrets
Publish from GitHub Actions using multi-factor authentication
GitHub Actions security score
| step-security/wait-for-secrets | |
|---|---|
Score | 8/10 |
License | Apache License 2.0 |
Maintained | Maintained by StepSecurity |
Vulnerabilities | 6 existing vulnerabilities detected |
Branch protection | branch protection is not maximal on development and all release branches |
Manual code review | Upstream changes are reviewed before merging |
Secure publishing | Reproducible builds with SBOM and provenance |
Signed commits | All commits are signed |
Automated security tools | Findings from tools are triaged and fixed before each change |
Popular | Used by StepSecurity enterprise customers |
Security Policy | security policy file detected |
Networking Behavior of step-security/wait-for-secrets
This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
Popular DestinationUnknown Destination
| Network Destination | Owner |
|---|---|
| prod.api.stepsecurity.io | Unknown |
| hooks.slack.com | Unknown |