Skip to content

CSTACKEX-191: logical access methods can have return type as primitive

0407d2b
Select commit
Loading
Failed to load commit list.
Open

CSTACKEX-191: logical access methods can have return type as primitive #60

CSTACKEX-191: logical access methods can have return type as primitive
0407d2b
Select commit
Loading
Failed to load commit list.
StepSecurity Actions Security / StepSecurity Harden-Runner succeeded May 22, 2026 in 22m 1s

No anomalous activity on CI/CD runners

No new Harden-Runner detections for this pull request.

Details

Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.

📋 Monitored GitHub Actions workflow runs

The following GitHub Actions workflow runs were monitored as part of this pull request.

Workflow Run ID Unique Destinations Actions Used Detailed Insights
ui.yml 26286282796 - - Harden-Runner not enabled
pre-commit.yml 26286379063 - - Harden-Runner not enabled
merge-conflict-checker.yml 26286379087 - - Harden-Runner not enabled
ui.yml 26286379062 - - Harden-Runner not enabled
codeql-analysis.yml 26286379061 - - Harden-Runner not enabled
build.yml 26286282878 - - Harden-Runner not enabled
sonar-check.yml 26286379091 - - Harden-Runner not enabled
merge-conflict-checker.yml 26286282803 - - Harden-Runner not enabled
ci.yml 26286282855 - - Harden-Runner not enabled
ci.yml 26286379088 - - Harden-Runner not enabled
codecov.yml 26286379089 - - Harden-Runner not enabled
rat.yml 26286379101 - - Harden-Runner not enabled
codecov.yml 26286282854 - - Harden-Runner not enabled
build.yml 26286379086 - - Harden-Runner not enabled
rat.yml 26286282856 - - Harden-Runner not enabled

📚 Learn More

You can learn more about this GitHub check here