Run
Generate CVE
Triggered via schedule by mostlikelee
main
30 days ago
Destinations
0
HTTPS Events
0
Actions
0
Detections
0
fleetdm/vulnerabilities
.github/workflows/generate-cve.yml - name: Harden Runner
uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142
with:
All Outbound Destinations
Name | Status | Jobs |
---|---|---|
![]() | Allowed | |
Allowed | ||
Allowed | ||
sum.golang.org | Allowed | |
![]() | Allowed | |
![]() | Allowed | |
Allowed | ||
api.vulncheck.com | Allowed | |
mxirhoir1bkom.mrap.accesspoint.s3-global.amazonaws.com | Allowed | |
repo.us-west-2.amazonaws.com | Allowed | |
packages.us-west-2.amazonaws.com | Allowed | |
cdn.amazonlinux.com | Allowed | |
amazonlinux.default.amazonaws.com | Allowed | |
![]() | Allowed |
All Detections
Name | Type | Detection | |
---|---|---|---|
No detections found |