[pre-commit.ci] pre-commit autoupdate#739
Conversation
updates: - [github.com/astral-sh/ruff-pre-commit: v0.14.10 → v0.15.9](astral-sh/ruff-pre-commit@v0.14.10...v0.15.9) - [github.com/python-jsonschema/check-jsonschema: 0.36.0 → 0.37.1](python-jsonschema/check-jsonschema@0.36.0...0.37.1) - [github.com/abravalheri/validate-pyproject: v0.24.1 → v0.25](abravalheri/validate-pyproject@v0.24.1...v0.25) - [github.com/rhysd/actionlint: v1.7.10 → v1.7.12](rhysd/actionlint@v1.7.10...v1.7.12) - [github.com/woodruffw/zizmor-pre-commit: v1.19.0 → v1.23.1](zizmorcore/zizmor-pre-commit@v1.19.0...v1.23.1)
Codecov Report✅ All modified and coverable lines are covered by tests. @@ Coverage Diff @@
## main #739 +/- ##
=======================================
Coverage 97.38% 97.38%
=======================================
Files 3 3
Lines 7690 7690
=======================================
Hits 7489 7489
Misses 201 201
Flags with carried forward coverage won't be shown. Click here to find out more. 🚀 New features to boost your workflow:
|
|
Pre-commit now fails, since zizmor complains about unpinned GitHub actions hashes. My opinion is still that this rule is not helpful for GitHub-maintained actions as hacked GitHub means a lot of trouble anyway. On the other hand, security fixes in the actions will not get propagated. I suggest we turn off that rule. |
hmm... while that's true, I feel like it would be quite easy for one of these repos specifically to be hacked without that causing problems for "the whole of GitHub more broadly? I assume there are specific developers in GitHub responsible for maintaining these repos who could get phished or have their machines compromised, etc. |
|
Sure, but it's likely that these developers have access to more critical infrastructure than just single actions. And the point remains that relying on specific tags means that we're susceptible to security problems that got fixed in later versions. |
|
My recommendation would be to hash-pin GitHub's first-party actions as well: GitHub's official guidance is to hash-pin everything, and rely on channels like Renovate or Dependabot for both periodic and security updates. (Relatedly, it's worth noting that the GitHub Actions under |
But we have dependabot configured on this repo, and dependabot will immediately file an out-of-schedule PR updating us to the latest version of a github action if that version is marked as fixing a security issue |
|
(Oops, posted simultaneously with @woodruffw there before I saw his comment!) |
updates: