Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #79 +/- ##
=========================================
Coverage 86.54% 86.54%
Complexity 270 270
=========================================
Files 15 15
Lines 602 602
Branches 109 109
=========================================
Hits 521 521
Misses 53 53
Partials 28 28 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
There was a problem hiding this comment.
Pull request overview
This pull request improves the security posture of GitHub Actions workflows by pinning the actions/add-to-project action to a specific commit SHA instead of using a mutable tag reference.
Changes:
- Pin
actions/add-to-projectaction to commit SHA244f685bbc3b7adfa8466e08b698b5577571133ewith a comment indicating it corresponds tov1.0.2
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| runs-on: ubuntu-latest | ||
| steps: | ||
| - uses: actions/add-to-project@v1.0.2 | ||
| - uses: actions/add-to-project@244f685bbc3b7adfa8466e08b698b5577571133e # v1.0.2 |
There was a problem hiding this comment.
The commit SHA pinning is inconsistent across workflow files. Other actions in the repository (e.g., actions/checkout@v6, actions/setup-java@v5 in build-java-17.yml, codeql-java-17.yml, release-maven-central-java-17.yml, and zizmor.yml) still use mutable version tags. For consistent security posture, consider applying the same SHA pinning strategy to all third-party actions across all workflows.
No description provided.