You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Reject actions that ship pre-compiled native binaries (Go, Rust, C, etc.) in-tree without verifiable build provenance.
Compatible licencing
Goal not criteria:
Reject actions with suspicious builds, e.g. those that use different dependencies than what the source implies (proposed by @dave2wave) — partially addressed by verify-action-build warnings
Following the discussion in #674 (comment)
Possible criteria:
pypa/gh-action-pypi-publish: pin to commit SHA instead of branch pattern #619, Fixdtolnay/rust-toolchain: pin to commit SHA instead of branch name #620)Goal not criteria:
Rejected:
- [ ] AttestationsMaybe others?
I would love to hear what others think.