step-security/paths-filter

step-security/paths-filter

Conditionally run actions based on files modified by PR, feature branch or pushed commits.

GitHubGitHub Repository

3 stars

Node.js

Node Action

Maintained by StepSecurity

Score updated 1 second ago

GitHub Actions security score comparison

step-security/paths-filterdorny/paths-filter

Score

9/10

6/10

License

MIT LicenseMIT License

Maintained

Maintained by StepSecurity9 commit(s) and 11 issue activity found in the last 90 days -- score normalized to 10

Vulnerabilities

9 existing vulnerabilities detected

23 existing vulnerabilities detected

Branch protection

Branch protection is maximal on development and all release branches

branch protection is not maximal on development and all release branches

Manual code review

Upstream changes are reviewed before merging-

Secure publishing

Reproducible builds with SBOM and provenance-

Signed commits

All commits are signed-

Automated security tools

Findings from tools are triaged and fixed before each change-

Popular

Used by StepSecurity enterprise customersUsed by 6944 open-source projects

Security Policy

security policy file detectedsecurity policy file not detected

Networking Behavior of step-security/paths-filter

This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.

Popular DestinationUnknown Destination
Network DestinationOwner
api.github.comGitHubGitHub
github.comGitHubGitHub