Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 21, 2025

Bumps actions/checkout from 5 to 6.

Release notes

Sourced from actions/checkout's releases.

v6.0.0

What's Changed

Full Changelog: actions/checkout@v5.0.0...v6.0.0

v6-beta

What's Changed

Updated persist-credentials to store the credentials under $RUNNER_TEMP instead of directly in the local git config.

This requires a minimum Actions Runner version of v2.329.0 to access the persisted credentials for Docker container action scenarios.

v5.0.1

What's Changed

Full Changelog: actions/checkout@v5...v5.0.1

Changelog

Sourced from actions/checkout's changelog.

Changelog

V6.0.0

V5.0.1

V5.0.0

V4.3.1

V4.3.0

v4.2.2

v4.2.1

v4.2.0

v4.1.7

v4.1.6

v4.1.5

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [actions/checkout](https://github.com/actions/checkout) from 5 to 6.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](actions/checkout@v5...v6)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-version: '6'
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels Nov 21, 2025
@dependabot dependabot bot requested review from a team and mmuller-tines as code owners November 21, 2025 00:24
@dependabot dependabot bot added the github_actions Pull requests that update GitHub Actions code label Nov 21, 2025
@dryrunsecurity
Copy link

DryRun Security

This pull request flags supply-chain risks in .github/workflows/test.yml where several GitHub Actions use floating/mutable tags (actions/checkout@v6, actions/setup-go@v6, golangci/golangci-lint-action@v8) and the linter is configured with version: latest, recommending pinning to exact release versions or commit SHAs to avoid unexpected or malicious changes. No secrets, elevated permissions, or insecure triggers were detected.

Supply Chain Risk in GitHub Actions in .github/workflows/test.yml
Vulnerability Supply Chain Risk in GitHub Actions
Description The GitHub Actions workflow uses a floating major version tag (actions/checkout@v6) for the checkout action. This practice introduces a supply chain risk because the code associated with the v6 tag can change over time without explicit review. A malicious update to the v6 tag by the action maintainers could lead to the execution of untrusted code within the CI/CD pipeline, potentially compromising the build environment, exfiltrating secrets, or injecting malicious code into the project's artifacts.

- uses: actions/checkout@v6
- uses: golangci/golangci-lint-action@v8
with:
version: latest

Code Policy: GitHub Action Policy
Policy GitHub Action Policy
Result Identified GitHub Actions Risks - Line 16: Uses third-party action golangci/golangci-lint-action@v8 via a mutable version tag. Pin to a specific commit SHA or exact release to reduce supply-chain risk. - Line 18: The linter is configured with version: latest, which fetches a rolling latest binary. This mutability can introduce unexpected changes; pin to a specific version. - Line 15: Uses first-party actions/checkout@v6 via a mutable tag. While first-party, pinning to a commit SHA or exact release is recommended to prevent unexpected updates. - Line 23: Uses first-party actions/checkout@v6 via a mutable tag. Same recommendation as above. - Line 24: Uses first-party actions/setup-go@v6 via a mutable tag. Prefer pinning to a commit SHA or exact release. No secrets usage, run: commands, permissions elevation, or insecure triggers are visible in this patch.

name: Lint
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v6
- uses: golangci/golangci-lint-action@v8
with:
version: latest
go-test:
name: Test
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v6
- uses: actions/setup-go@v6
with:
go-version: '1.23.10'


All finding details can be found in the DryRun Security Dashboard.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants