Security hardening: secret scanning CI, Dockerfile supply-chain fixes, SECURITY.md#5
Draft
Security hardening: secret scanning CI, Dockerfile supply-chain fixes, SECURITY.md#5
Conversation
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Addresses several supply-chain and secret-exposure risks: no CI secret scanning,
curl | bashinstaller patterns in the Dockerfile, a generic non-actionable SECURITY.md, and untracked transcript output directories.Changes
.github/workflows/secret-scanning.yml(new)gitleaks/gitleaks-action@v2.3.9(pinned) on PRs and pushes tomainwith full history (fetch-depth: 0)contents: read); fails build on verified findingsDockerfile— eliminatecurl | bash/shcurl … | bash -(NodeSource setup script)curl … | sh(uv installer)pip3 install --no-cache-dir uvvia PyPIPATHincluded/root/.cargo/binAdded
python3-pipto the Python apt install step to support pip-based uv install.SECURITY.mdReplaced generic Microsoft template with repo-specific guidance: GitHub Security Advisory link for private disclosure, 90-day timeline, scope definition, and a note about
.env.exampleand automated scanning..gitignoreAdded
exported_transcripts/— session transcript output that was untracked and could contain sensitive context.Original prompt
This pull request was created from Copilot chat.
✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.