Skip to content

Commit f086349

Browse files
Merge pull request #416 from step-security/rc-8
Release 2.8.0
2 parents 9ff9d14 + b9c325d commit f086349

File tree

7 files changed

+33
-5
lines changed

7 files changed

+33
-5
lines changed

README.md

+28
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,34 @@ Once allowed endpoints are set in the policy in the workflow file, or in the [Po
161161
<img src="images/blocked-outbound-call-3.png" alt="Policy recommended by harden-runner" >
162162
</p>
163163

164+
### 📋 View the name and path of every file written during the build process
165+
166+
> Applies to both GitHub-hosted and self-hosted runners
167+
168+
View the name and path of every file that was written during the build process. This feature is supported with a commercial license.
169+
170+
- Harden-Runner tracks every file written to the GitHub Actions working directory during the build process.
171+
- In the insights page in the `File Write Events` tab you can see a file explorer view of each file that was written to.
172+
- Clicking on any file reveals a list of processes that wrote to it, providing complete transparency.
173+
174+
<p align="left">
175+
<img src="images/file-write-events.png" alt="View the name and path of every file written during the build process" >
176+
</p>
177+
178+
### 🔄 View process names and arguments
179+
180+
> Applies to both GitHub-hosted and self-hosted runners
181+
182+
View process names, PIDs, and process arguments. This feature is supported with a commercial license.
183+
184+
- Harden-Runner tracks every process that is run during the build process.
185+
- Clicking on any file reveals a list of processes that wrote to it.
186+
- You can walk up the process tree and view process arguments to understand the build process and detect suspicious activity.
187+
188+
<p align="left">
189+
<img src="images/process-events-3.png" alt="View process names and arguments" >
190+
</p>
191+
164192
### 📁 Detect tampering of source code during build
165193

166194
> Applies to both GitHub-hosted and self-hosted runners

dist/pre/index.js

+2-2
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

dist/pre/index.js.map

+1-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

images/file-write-events.png

79.3 KB
Loading

images/process-events-3.png

86.9 KB
Loading

src/checksum.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ export function verifyChecksum(downloadPath: string, is_tls: boolean) {
1414

1515
if (is_tls) {
1616
expectedChecksum =
17-
"e0cd0f0da1ac48df713acd8c4f0e591274de0f2c251b8526cf956c654f024ec2"; // checksum for tls_agent
17+
"846ae66c6cfab958fe61736cec0b58bdb7651b36af04c279405c7114675d7033"; // checksum for tls_agent
1818
}
1919

2020
if (checksum !== expectedChecksum) {

src/setup.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ interface MonitorResponse {
231231

232232
if (await isTLSEnabled(context.repo.owner)) {
233233
downloadPath = await tc.downloadTool(
234-
"https://packages.stepsecurity.io/github-hosted/harden-runner_1.1.3_linux_amd64.tar.gz"
234+
"https://packages.stepsecurity.io/github-hosted/harden-runner_1.2.0_linux_amd64.tar.gz"
235235
);
236236
verifyChecksum(downloadPath, true); // NOTE: verifying tls_agent's checksum, before extracting
237237
} else {

0 commit comments

Comments
 (0)