Skip to content

fix: pin actions to SHA, npm audit fix, add CODEOWNERS#72

Open
magnonta wants to merge 2 commits into
mainfrom
fix/pin-actions-and-audit
Open

fix: pin actions to SHA, npm audit fix, add CODEOWNERS#72
magnonta wants to merge 2 commits into
mainfrom
fix/pin-actions-and-audit

Conversation

@magnonta
Copy link
Copy Markdown
Contributor

Summary

Pin all GitHub Actions to commit SHA, fix npm audit vulnerabilities, and add CODEOWNERS.

Motivation

Supply chain security hardening. Actions pinned to mutable version tags (@v6, @v4) can be compromised — especially risky on the release workflow which has contents: write and id-token: write permissions.

Changes

  • Pin actions to SHA across test.yml, release.yml, and pages.yml (version kept as comment)
  • npm audit fix — 0 vulnerabilities remaining (was 5, including 1 high-severity fast-xml-parser)
  • CODEOWNERS@magnonta and @cayohollanda as default reviewers

Type of change

  • CI / tooling
  • Maintenance or cleanup

How to test or review

npm run ci
npm audit

Security and privacy checklist

  • This change is generic and safe for a public repository.
  • No secrets, credentials, private keys, tokens, passwords, or sensitive payloads were added.
  • No private company, client, customer, or personal sensitive context was added.

User impact

None — CI/CD pipeline changes only.

Breaking changes or migration notes

None.

- Pin all GitHub Actions to commit SHA across test, release, and pages workflows
- Run npm audit fix (0 vulnerabilities remaining)
- Add CODEOWNERS with @magnonta and @cayohollanda
Copilot AI review requested due to automatic review settings May 14, 2026 17:10
@magnonta magnonta added security Security-related changes or findings ci-cd Pipeline, workflows, or tooling labels May 14, 2026
Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR hardens the repository’s supply chain posture by pinning GitHub Actions to immutable SHAs, updating the npm dependency tree via npm audit fix, and introducing CODEOWNERS for default review routing.

Changes:

  • Pin all GitHub Actions in CI/release/pages workflows to commit SHAs (with version comments retained).
  • Update package-lock.json to address npm audit vulnerabilities and refresh transitive dependencies.
  • Add a default .github/CODEOWNERS file to assign reviewers.

Reviewed changes

Copilot reviewed 4 out of 5 changed files in this pull request and generated 1 comment.

Show a summary per file
File Description
package-lock.json Updates the lockfile dependency graph after npm audit fix.
.github/workflows/test.yml Pins CI workflow actions to SHAs.
.github/workflows/release.yml Pins release workflow actions to SHAs.
.github/workflows/pages.yml Pins Pages workflow actions to SHAs.
.github/CODEOWNERS Adds default code ownership for review assignment.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread .github/workflows/test.yml Outdated
Addresses Copilot review: --package-lock=false was bypassing the lockfile,
making CI non-reproducible and ignoring the audited dependency graph.

Switched to npm ci which enforces the lockfile. Removed --omit=peer
as npm ci handles peer deps correctly.
@cayohollanda cayohollanda self-requested a review May 14, 2026 19:32
Copy link
Copy Markdown
Contributor

@cayohollanda cayohollanda left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

ci-cd Pipeline, workflows, or tooling security Security-related changes or findings

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants