InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

GitHub Actions Security for Actions Runner Controller (ARC) and GitHub-Hosted Runners

Varun Sharma
InfoSec Write-ups
Published in
5 min readJul 26, 2023

Introduction

Poisoned workflow can lead to exfiltration of CI/CD credentials or tampering of release builds

Implementing Runtime Security for Actions Runner Controller (ARC) Environment

Security Observability with StepSecurity

Security Observability for GitHub Actions workflows on ARC

Preventing Code and CI/CD Credentials Exfiltration

Simulation of Codecov breach and how block policy prevents it

Detecting Tampering of Release Builds

Detecting tampering of release builds

Runtime Security for GitHub-Hosted Runner

Explore open source projects using Harden-Runner at https://github.com/step-security/harden-runner

Conclusion

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

No responses yet

Write a response