| Version | Supported |
|---|---|
| latest | ✅ |
Please report security vulnerabilities to the repository maintainers through GitHub's private vulnerability reporting feature or by creating a private security advisory.
- Issue: The
anthropics/claude-code-action@betacannot be pinned to a specific commit SHA as it's in beta - Risk Level: Medium (Unacceptable without SHA pinning)
- Status: DISABLED - Workflow has been disabled to comply with security policy
- Resolution:
- The workflow file has been disabled (claude.yml shows security notice only)
- Original workflow preserved in
.github/workflows/claude.yml.disabled - Will be re-enabled once a stable version with SHA pinning is available
- Temporary Enable Process (if risk is accepted):
- Rename
.github/workflows/claude.yml.disabledtoclaude.yml - Document security exception with business justification
- Implement all mitigations (environment approval, trigger validation, timeout)
- Rename
- Tracking: Monitor for stable releases at https://github.com/anthropics/claude-code-action/releases
All other GitHub Actions are pinned to specific commit SHAs for security:
actions/checkout: SHA08c6903cd8c0fde910a37f88322edcfb5dd907a8(v5.0.0)actions/setup-python: SHAf677139bbe7f9c59b41e40162b753c062f5d49a3(v5.2.0)actions/cache: SHA0400d5f644dc74513175e3cd8d07132dd4860809(v4.2.4)codecov/codecov-action: SHAb9fd7d16f6d7d1b5d2bec1a2887e65ceed900238(v4.6.0)actions/upload-artifact: SHAb4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882(v4.4.3)
The Docker container implements multiple security layers:
- Non-root execution: Runs as
appuser - Read-only filesystem: Application code is immutable (chmod 444/555)
- No embedded secrets: Configuration must be mounted externally
- Minimal base image: Uses
python:3.11-slim - Health checks: Container health monitoring enabled
- All Python dependencies are specified with exact versions in
requirements.txt - Regular dependency updates are performed
- Security scanning via Dependabot is enabled
- Never commit secrets: Use GitHub Secrets for sensitive data
- Review PRs carefully: Especially those modifying workflows or Docker configuration
- Keep dependencies updated: Regular updates for security patches
- Use environment protection: Required approvals for production deployments
- Monitor SonarCloud: Regular review of security hotspots and vulnerabilities
This project uses SonarCloud for continuous security analysis. Current security posture:
- Security hotspots are reviewed and addressed regularly
- Known issues are documented with risk assessments
- Mitigations are implemented where direct fixes aren't possible