Appearance
Why It Matters
Third-party GitHub Actions referenced by tags or short refs stay mutable over time. In committed CI workflows, that weakens reproducibility and makes it harder to review exactly which action code the workflow approved.
What Triggers
SEC324 applies only to semantically confirmed GitHub Actions workflow YAML and triggers when:
- a
uses:step references a third-party action - the action ref is not a full 40-character commit SHA
- the reference is not an official
actions/*action
Examples that trigger:
yaml
- uses: docker/login-action@v4
- uses: aquasecurity/trivy-action@masterExamples that stay clean:
yaml
- uses: docker/login-action@0123456789abcdef0123456789abcdef01234567
- uses: actions/checkout@v6False Positives
This rule is intentionally positioned as a supply-chain hardening control, not as proof of a compromised action. Some teams may trust release tags operationally, but the finding remains useful because it identifies mutable third-party execution in committed CI.
Remediation
Pin the third-party action to a full commit SHA and, if useful for readability, keep the human-friendly version in an adjacent comment.