Click any tag below to further narrow down your results
Links
This article discusses the security vulnerabilities associated with GitHub Actions, highlighting issues like secrets management failures, insufficient permission management, and dependency pinning failures. It emphasizes the importance of understanding these risks to protect CI/CD workflows from potential attacks.
GitHub Actions now offers analytics that help developers track job performance, resource usage, and failure rates. Users can filter data by repository and time frame to spot trends and optimize build processes. The insights page provides recommendations for improving job efficiency.
GitHub is postponing changes to self-hosted Actions billing to gather more feedback from users. Starting January 1, 2026, they will reduce prices for hosted runners by up to 39% while introducing a $0.002 per-minute charge for all actions workflows. Self-hosted runner pricing changes will take effect on March 1, 2026.
GitHub Actions has seen significant growth and improvements since its 2018 launch, now handling 71 million jobs daily. The article details recent feature updates like YAML anchors and larger cache limits, along with plans for 2026, including scheduled job timezones and parallel steps.
GitHub reversed its plan to charge $0.002 per minute for self-hosted runners after user backlash. The company acknowledged it needed more user input before implementing such changes and is open to feedback on future pricing strategies. While the charge is postponed, GitHub may still introduce fees later.
This article outlines how to manage the recent change in NPM's token policy, which limits token validity to 90 days. It introduces a tool called github-update-secret that automates the process of updating access tokens across multiple GitHub repositories. While the long-term solution is to adopt OIDC, this tool provides a temporary fix.
GitHub is implementing a $0.002-per-minute fee for all Actions usage starting March 1, 2026. This change monetizes the Actions control plane, making self-hosting no longer free while reducing the cost of GitHub-hosted runners. Companies will now face both compute costs and platform fees for their CI workloads.
The article provides a comprehensive guide on securing GitHub Actions, emphasizing best practices for protecting workflows and sensitive data. It discusses common security risks and offers actionable recommendations to mitigate those risks, ensuring safer automation in software development processes.
The article outlines five essential GitHub Actions that every maintainer should be familiar with to streamline their workflows and enhance project management. It emphasizes the importance of automating tasks such as testing, deployment, and code quality checks to improve efficiency and collaboration in open source projects.
GitHub Actions can significantly streamline data workflow automation by utilizing four distinct levels of capabilities. Each level offers varying degrees of complexity and functionality, catering to different automation needs from simple triggers to advanced custom workflows. Understanding these levels helps users effectively implement automation strategies tailored to their projects.
A recent analysis of 100 popular security projects on GitHub revealed that only a small fraction have pinned their GitHub Actions to specific commits, leaving many workflows vulnerable to silent changes. The study highlighted the importance of pinning actions to ensure code stability and security, while also addressing the risks posed by transitive dependencies that may not be pinned. Recommendations for securing workflows include using tools to automate the pinning process and keeping actions updated.