Click any tag below to further narrow down your results
Links
This article details DNSimple's journey to automate their management of GitHub repositories using Infrastructure as Code principles. It highlights the transition from a manual tool called Repocop to a more efficient system built with Terraform and CI/CD practices, improving consistency and visibility across hundreds of repositories.
A typosquatted npm package named “@acitons/artifact” impersonated the legitimate “@actions/artifact” to exploit GitHub's CI/CD workflows. It stole tokens from build environments and published malicious artifacts, highlighting vulnerabilities in supply chain security.
This article discusses the security vulnerabilities associated with GitHub Actions, highlighting issues like secrets management failures, insufficient permission management, and dependency pinning failures. It emphasizes the importance of understanding these risks to protect CI/CD workflows from potential attacks.
GitHub Actions' recent support for YAML anchors is criticized for being redundant and complicating the CI/CD data model, making it harder for users to comprehend workflows. The author argues that anchors introduce unnecessary non-locality and do not provide unique benefits since GitHub does not support merge keys, which limits their usefulness. Ultimately, the author calls for GitHub to remove YAML anchors to enhance security and clarity in workflows.