diff --git a/readme.md b/readme.md index fa54e33..a7b8ca2 100644 --- a/readme.md +++ b/readme.md @@ -318,6 +318,7 @@ Static Analysis Security Testing (SAST) tools scan software for vulnerabilities Supply chain attacks come in different forms, targeting parts of the SDLC that are inherently 3rd party: tools in CI, external code that's been executed, and more. Supply chain security tooling can defend against these kinds of attacks. +- [gh-workflow-hardener](https://github.com/indoor47/gh-workflow-hardener) - _indoor47_ - Scans GitHub Actions workflow files to pin action references to immutable SHA hashes, detect overly-broad permissions, and flag script injection vulnerabilities. - [Harden Runner GitHub Action](https://github.com/step-security/harden-runner) - _StepSecurity_ - installs a security agent on the GitHub-hosted runner (Ubuntu VM) to prevent exfiltration of credentials, detect compromised dependencies and build tools, and detect tampering of source code during the build. - [Overlay](https://github.com/os-scar/overlay) - _SCAR_ - a browser extension helping developers evaluate open source packages before picking them. - [Preflight](https://github.com/spectralops/preflight) - _Spectral_ - helps you verify scripts and executables to mitigate supply chain attacks in your CI and other systems, such as in the recent [Codecov hack](https://spectralops.io/blog/credentials-risk-supply-chain-lessons-from-the-codecov-breach/).