chore: [StepSecurity] Apply security best practices #1558
StepSecurity Actions Security / StepSecurity Harden-Runner
succeeded
Mar 6, 2026 in 6h 1m 55s
No anomalous activity on CI/CD runners
No new Harden-Runner detections for this pull request.
Details
Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.
📋 Monitored GitHub Actions workflow runs
The following GitHub Actions workflow runs were monitored as part of this pull request.
| Workflow | Run ID | Unique Destinations | Actions Used | Detailed Insights |
|---|---|---|---|---|
| codeql | 22772355235 | - | - | Harden-Runner not enabled |
| slither.yml | 22772355648 | 12 | 4 | View Insights |
| opcode-logger-testing.yml | 22772355625 | 14 | 4 | View Insights |
| pr-label-milestone-check.yml | 22772355627 | 5 | 3 | View Insights |
| erc-registry-test.yml | 22772355678 | 10 | 3 | View Insights |
| tests.yml | 22772355672 | - | - | Harden-Runner not enabled |
| flow-pr-title-check.yml | 22772355669 | 4 | 2 | View Insights |
| system-contract-dapp.yml | 22772355612 | 6 | 3 | View Insights |
| foundry_test.yml | 22772355655 | 6 | 4 | View Insights |
📚 Learn More
You can learn more about this GitHub check here
Loading