Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump golangci/golangci-lint-action from 6.2.0 to 6.3.0 #1512

Merged

build(deps): bump golangci/golangci-lint-action from 6.2.0 to 6.3.0

af2c87f
Select commit
Loading
Failed to load commit list.
Merged

build(deps): bump golangci/golangci-lint-action from 6.2.0 to 6.3.0 #1512

build(deps): bump golangci/golangci-lint-action from 6.2.0 to 6.3.0
af2c87f
Select commit
Loading
Failed to load commit list.
StepSecurity Actions Security / StepSecurity Harden-Runner succeeded Feb 5, 2025 in 4m 1s

No anomalous activity on CI/CD runners

No new Harden-Runner detections for this pull request.

Details

Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.

Monitored GitHub Actions workflow runs

The following GitHub Actions workflow runs were monitored as part of this pull request.

Workflow Workflow Run Insights
go-tests.yaml Insights URL
codeql.yml Harden-Runner not enabled
build-samples.yml Insights URL
verify.yaml Harden-Runner not enabled
codeql.yaml Insights URL
build.yaml Insights URL

Learn More

You can learn more about this GitHub check here