Bump ossf/scorecard-action from 2.4.0 to 2.4.3 #4
⚠️ Unexpected network calls from CI/CD runners
Harden-Runner has generated new alerts for GitHub Actions workflow runs in this pull request. These findings may indicate malicious activities or misconfigurations, so prompt analysis is recommended.
Details
Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.
✅ Click here to approve this check run
The following anomalous outbound network calls were detected.
| Endpoint | Workflow | Workflow Run Insights | status |
|---|---|---|---|
whois.tucows.com:43 |
guarddog.yml | Insights URL |
🔎 Potential next steps
Anomalous Network Call
To investigate and triage the detection, please follow the runbook at https://docs.stepsecurity.io/harden-runner/runbooks/anomalous-outbound-network-calls
📋 Monitored GitHub Actions workflow runs
The following GitHub Actions workflow runs were monitored as part of this pull request.
| Workflow | Run ID | Unique Destinations | Actions Used | Detailed Insights |
|---|---|---|---|---|
| auto_cherry_pick.yml | 20116456343 | - | - | Harden-Runner not enabled |
| claude_review.yml | 20116456337 | 1 | 6 | View Insights |
| guarddog.yml | 20116456314 | 23 | 3 | View Insights |
| codeql.yml | 20116456271 | 2 | 3 | View Insights |
| dependency-review.yml | 20116456251 | 3 | 3 | View Insights |
| test.yml | 20116456240 | 5 | 3 | View Insights |
📚 Learn More
You can learn more about this GitHub check here