Step Security Blog

https://www.stepsecurity.io

Detect, prevent, and respond to software supply chain attacks. End-to-end protection for AI agents, developer machines, npm packages, and CI/CD pipelines.

フィード

記事のアイキャッチ画像
10 Layers Deep: How StepSecurity Stops TeamPCP's Trivy Supply Chain Attack on GitHub Actions
Step Security Blog
TeamPCP weaponized 76 Trivy version tags overnight. The KICS attack followed the same playbook days later. One security control is not enough. Here is how the StepSecurity platform's ten independent security layers work together to prevent credential exfiltration, detect compromised actions at runtime, and respond to incidents across your entire organization before attackers can succeed.
3日前
記事のアイキャッチ画像
axios Compromised on npm - Malicious Versions Drop Remote Access Trojan
はてなブックマークアイコン 65
Step Security Blog
Hijacked maintainer account used to publish poisoned axios releases including 1.14.1 and 0.30.4. The attacker injected a hidden dependency that drops a cross platform RAT. We are actively investigating and will update this post with a full technical analysis.
4日前
記事のアイキャッチ画像
Malicious IoliteLabs VSCode Extensions Target Solidity Developers on Windows, macOS, and Linux with Backdoor
Step Security Blog
A supply chain attack targeting Solidity and Web3 developers has been discovered across three IoliteLabs VSCode extensions (solidity-macos, solidity-windows, and solidity-linux) embedding obfuscated backdoors that download remote payloads and establish persistence on all major platforms. StepSecurity is actively investigating this incident and will publish a full technical analysis with IOCs and remediation guidance shortly.
4日前
記事のアイキャッチ画像
TeamPCP Plants WAV Steganography Credential Stealer in telnyx PyPI Package
Step Security Blog
On March 27, 2026, TeamPCP injected a WAV steganography-based credential stealer into two releases of the telnyx Python SDK on PyPI. The issue was disclosed in team-telnyx/telnyx-python#235. TeamPCP is the same group behind the litellm supply chain compromise three days earlier, identified by a shared RSA-4096 public key, identical encryption scheme, and the tpcp.tar.gz exfiltration signature present in both attacks.
4日前
記事のアイキャッチ画像
litellm: Credential Stealer Hidden in PyPI Wheel
Step Security Blog
On March 24, 2026, a critical supply chain compromise was identified in litellm==1.82.8: the PyPI package contains a malicious litellm_init.pth file
9日前
記事のアイキャッチ画像
Checkmarx KICS GitHub Action Compromised: Malware Injected in All Git Tags
Step Security Blog
All release tags in the Checkmarx/kics-github-action repository have been compromised with an infostealer payload. If you are using this Action pinned to any version tag, treat your CI/CD secrets as compromised and rotate immediately.
11日前
記事のアイキャッチ画像
CanisterWorm: How a Self-Propagating npm Worm Is Spreading Backdoors Across the Ecosystem
Step Security Blog
Following Trivy's compromise, StepSecurity's AI Package Analyst flagged suspicious new releases across multiple npm scopes — revealing CanisterWorm, a self-propagating npm worm deployed by the TeamPCP threat actor. The worm is a direct continuation of the second Trivy compromise (v0.69.4): attackers embedded a credential harvester in Trivy's CI/CD toolchain, stole npm tokens from affected pipelines, then used those tokens to publish backdoored patch versions across every namespace they could reach — including the @opengov scope (16+ packages).
11日前
記事のアイキャッチ画像
Trivy Compromised a Second Time - Malicious v0.69.4 Release, aquasecurity/setup-trivy, aquasecurity/trivy-action GitHub Actions Compromised
Step Security Blog
On March 19, 2026, trivy — a widely used open source vulnerability scanner maintained by Aqua Security — experienced a second security incident. Three weeks after the hackerbot-claw incident on February 28 that resulted in a repository takeover, a new compromised release (v0.69.4) was published to the trivy repository. The original incident disclosure discussion (#10265) was also deleted during this period, and version tags on the aquasecurity/setup-trivy GitHub Action were removed. Trivy maintainers deleted the v0.69.4 tag and Homebrew downgraded to v0.69.3. The following is a factual account of what we observed through public GitHub data.
11日前
記事のアイキャッチ画像
bittensor-wallet 4.0.2 Compromised on PyPI - Backdoor Exfiltrates Private Keys
Step Security Blog
On March 17, 2026, bittensor-wallet 4.0.2 was identified as a compromised PyPI package. The malicious release had been live on PyPI for approximately 48 hours before being yanked. This post is a ground-up technical breakdown based on a direct diff of the source tarballs for versions 4.0.1 and 4.0.2 — covering exactly what changed, how the backdoor works, and what defenders should do. We also ran the compromised package with StepSecurity Harden Runner and captured every C2 channel firing in real time.
11日前
記事のアイキャッチ画像
Malicious npm Releases Found in Popular React Native Packages - 130K+ Monthly Downloads Compromised
Step Security Blog
On March 16, 2026, StepSecurity Threat Intel was the first to detect and report malicious releases in two popular React Native npm packages — react-native-international-phone-number and react-native-country-select. StepSecurity's AI Package Analyst flagged the compromised versions, and within minutes, StepSecurity filed security issues directly in both GitHub repositories — alerting the maintainer and the community before any other security vendor.
11日前
記事のアイキャッチ画像
Malicious Polymarket Bot Hides in Hijacked dev-protocol GitHub Org and Steals Wallet Keys
Step Security Blog
The StepSecurity threat intelligence team discovered that dev-protocol — a verified GitHub organization with 568 followers belonging to a legitimate Japanese DeFi project — has been hijacked and is now being used to distribute malicious Polymarket trading bots.
11日前
記事のアイキャッチ画像
ForceMemo: Hundreds of GitHub Python Repos Compromised via Account Takeover and Force-Push
Step Security Blog
The StepSecurity threat intelligence team was the first to discover and report on an ongoing campaign — which we are tracking as ForceMemo — in which an attacker is compromising hundreds of GitHub accounts and injecting identical malware into hundreds of Python repositories. The earliest injections date to March 8, 2026, and the campaign is still active with new repos continuing to be compromised.
11日前
記事のアイキャッチ画像
xygeni-action Compromised: C2 Reverse Shell Backdoor Injected via Tag Poisoning
Step Security Blog
The official Xygeni GitHub Action (xygeni-action) was compromised on March 3, 2026, when an attacker using stolen maintainer credentials injected a full C2 reverse shell backdoor and silently moved the mutable v5 tag to the malicious commit - affecting all repositories referencing @v5 without any visible change to their workflow files. The v5 tag remains poisoned as of March 9; users should immediately pin to v6.4.0 or a specific commit SHA, and StepSecurity's Harden-Runner would have detected and blocked the C2 callback to 91.214.78.178.
11日前
記事のアイキャッチ画像
hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far
Step Security Blog
A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets. The attacker, an autonomous bot called hackerbot-claw, used 5 different exploitation techniques and successfully exfiltrated a GitHub token with write permissions from one of the most popular repositories on GitHub. This post breaks down each attack, shows the evidence, and explains what you can do to protect your workflows.
14日前
記事のアイキャッチ画像
Dev Machine Guard Is Now Open Source: See What's Really Running on Your Developer Machine
Step Security Blog
Your developer machine is running AI agents, MCP servers, IDE extensions, and hundreds of packages. Do you know which ones? Now there's a free, open-source way to find out.
22日前
記事のアイキャッチ画像
kubernetes-el Compromised: How a Pwn Request Exploited a Popular Emacs Package
Step Security Blog
On March 5, 2026, a threat actor exploited a classic "Pwn Request" vulnerability in the CI workflow of kubernetes-el/kubernetes-el, a popular Emacs package for managing Kubernetes clusters. The attacker stole the repository's GITHUB_TOKEN (with full write permissions), exfiltrated CI/CD secrets, defaced the repository, and injected destructive code.
1ヶ月前
記事のアイキャッチ画像
Datadog's DevSecOps 2026 Report Validates What We've Been Building
Step Security Blog
Datadog's State of DevSecOps 2026 report confirms what StepSecurity has been warning about for years: CI/CD pipelines and GitHub Actions are prime targets for supply chain attacks. Learn how StepSecurity's platform directly mitigates every major risk identified in the report, from unpinned actions to day-of-release dependencies.
1ヶ月前
記事のアイキャッチ画像
How StepSecurity Caught a Release Storm in Microsoft’s @types Packages
Step Security Blog
StepSecurity AI Package Analyst detected 70+ ghost releases across npm's most trusted TypeScript packages.
1ヶ月前
記事のアイキャッチ画像
Harden Runner Now Supports Windows and macOS GitHub Actions Runners
Step Security Blog
Harden Runner now supports Windows and macOS GitHub Actions runners, delivering EDR-level runtime security across Linux, Windows, and macOS CI/CD pipelines
1ヶ月前
記事のアイキャッチ画像
Securing Vibe Coding and AI Coding Agents: An End-to-End Approach with StepSecurity
Step Security Blog
AI coding agents install packages, create pull requests, push commits, and run autonomously in CI/CD pipelines. Here's how to secure every stage of that workflow
1ヶ月前
記事のアイキャッチ画像
StepSecurity’s Unified Protection Across the SDLC Infrastructure Threat Framework (SITF)
Step Security Blog
How StepSecurity delivers real-world protection across all critical pillars identified in Wiz's SDLC Infrastructure Threat Framework (SITF)
2ヶ月前
記事のアイキャッチ画像
10,000 Open-Source Projects Now Secured by Harden-Runner Community-Tier: A Milestone Three Years in the Making
Step Security Blog
From 5,000 to 10,000 in just one year: How Harden-Runner doubled its reach and became the standard for CI/CD runtime security
2ヶ月前
記事のアイキャッチ画像
20+ Popular NPM Packages Compromised (Chalk, Debug, Strip-ANSI, Color-Convert, Wrap-ANSI...)
Step Security Blog
Massive NPM supply chain attack targets cryptocurrency users through compromised maintainer account - affecting packages downloaded billions of times weekly including debug, chalk, ansi-styles, color-convert, strip-ansi and 15+ other critical JavaScript packages. Malicious code injected to steal cryptocurrency wallets and redirect blockchain transactions.
2ヶ月前
記事のアイキャッチ画像
2024 in Review: The Evolution of CI/CD Security & What's Next
Step Security Blog
Discover the key developments in CI/CD security in 2024, including major incidents, real-world case studies, and emerging trends for 2025. Learn how StepSecurity is driving innovation to secure CI/CD pipelines with proactive solutions.
2ヶ月前
記事のアイキャッチ画像
How to Use Docker in Actions Runner Controller (ARC) Runners Securely
Step Security Blog
Discover best practices for using Docker in Actions Runner Controller (ARC) runners securely. Learn how to implement network egress filtering and runtime security to protect your CI/CD pipelines effectively.
2ヶ月前
記事のアイキャッチ画像
Celebrating 1000 Repositories Secured with Harden Runner: A Journey of Growth and Collaboration
Step Security Blog
StepSecurity Harden-Runner has secured 1,000+ repositories! Celebrate this milestone with us as we reflect on our journey of growth, collaboration, and commitment to enhancing CI/CD security.
2ヶ月前
記事のアイキャッチ画像
StepSecurity Detects Early Supply Chain Risk Signals in kilocode npm
Step Security Blog
StepSecurity detected early supply chain risk signals in a legitimate kilocode npm release, showing how small behavior changes can quietly weaken trust before attacks happen
2ヶ月前
記事のアイキャッチ画像
Another npm Supply Chain Attack: The 'is' Package Compromise
Step Security Blog
npm 'is' package versions 3.3.1 and 5.0.0 compromised - critical utility with millions of weekly downloads falls victim to expanding phishing campaign
2ヶ月前
記事のアイキャッチ画像
anthropics/claude-code-action Security: How to Secure Claude Code in GitHub Actions with Harden-Runner
Step Security Blog
Unlike GitHub Copilot's built-in network firewall, anthropics/claude-code-action GitHub action operates in GitHub Actions without network restrictions by default. Complete guide to implementing Claude Code in GitHub Actions with runtime security monitoring using Harden-Runner.
2ヶ月前
記事のアイキャッチ画像
Harden-Runner detection: tj-actions/changed-files action is compromised
Step Security Blog
tj-actions/changed-files
2ヶ月前
記事のアイキャッチ画像
StepSecurity's Catalog of Fixes
Step Security Blog
Explore StepSecurity's Catalog of Fixes, a comprehensive resource to help developers automate security fixes in GitHub Actions workflows. Learn how to improve CI/CD security with actionable solutions.
2ヶ月前
記事のアイキャッチ画像
Orchestrating Security: StepSecurity's Impact on 400+ Repositories and Future Plans
Step Security Blog
StepSecurity has secured over 400 repositories and is shaping the future of CI/CD security. Learn about our impact, key milestones, and upcoming plans to enhance GitHub Actions security.
2ヶ月前
記事のアイキャッチ画像
Announcing Anomalous Outbound Call Detection Using Machine Learning
Step Security Blog
StepSecurity introduces anomalous outbound call detection using machine learning! Learn how this feature enhances CI/CD security by identifying and mitigating suspicious network activities in real-time.
2ヶ月前
記事のアイキャッチ画像
Announcing GitHub Actions Advisor and StepSecurity Maintained Actions
Step Security Blog
Introducing GitHub Actions Advisor and StepSecurity-maintained Actions! Learn how these tools help developers enhance GitHub Actions security, manage third-party risks, and ensure workflow compliance effortlessly.
2ヶ月前
記事のアイキャッチ画像
Analysis of Backdoored XZ Utils Build Process with Harden-Runner
Step Security Blog
Explore an in-depth analysis of the backdoored XZ Utils build process using StepSecurity Harden-Runner. Learn how real-time monitoring detected malicious activity and safeguarded CI/CD pipelines from supply chain attacks.
2ヶ月前
記事のアイキャッチ画像
Announcing General Availability of Harden Runner
Step Security Blog
StepSecurity announces the general availability of Harden-Runner! Discover how this powerful tool enhances CI/CD security by monitoring network egress, detecting anomalies, and automating GitHub Actions protection.
2ヶ月前
記事のアイキャッチ画像
Milestone Achieved: 2500+ Public Repositories Secured with Harden-Runner
Step Security Blog
StepSecurity Harden-Runner has secured 2,500+ public repositories! Learn how this milestone reflects the growing trust in CI/CD security solutions to protect GitHub Actions workflows and prevent supply chain attacks.
2ヶ月前
記事のアイキャッチ画像
Build secretless CI/CD pipelines using wait-for-secrets
Step Security Blog
Learn how to build secure, secretless CI/CD pipelines using the "Wait for Secrets" approach by StepSecurity. Discover how to reduce secret exposure risks and enhance GitHub Actions security.
2ヶ月前
記事のアイキャッチ画像
Introducing Apps & PATs: Centralized Visibility for GitHub Apps and Personal Access Tokens
Step Security Blog
Get visibility into GitHub Apps, fine-grained PATs, and classic PATs across all your organizations in one dashboard
2ヶ月前
記事のアイキャッチ画像
CVE-2026-22709: Critical Sandbox Escape Vulnerability in vm2
Step Security Blog
CVE-2026-22709; vm2
2ヶ月前
記事のアイキャッチ画像
StepSecurity Now Supports Dark Mode
Step Security Blog
StepSecurity now supports dark mode for a more comfortable security investigation experience. Reduce eye strain and stay focused during long CI/CD analysis sessions
2ヶ月前
記事のアイキャッチ画像
Introducing StepSecurity Developer MDM: Protecting Developer Machines from Supply Chain Attacks
Step Security Blog
Modern supply chain attacks target developer machines and AI coding agents. Learn how StepSecurity Developer MDM stops credential theft early
3ヶ月前
記事のアイキャッチ画像
2025 in Review: The Evolution of Supply Chain Security & What's Next
Step Security Blog
How StepSecurity achieved 5X ARR growth for the second year in a row while securing over 10,000 open-source repositories in 2025
3ヶ月前
記事のアイキャッチ画像
Bake Harden-Runner Into GitHub's Custom Runner Images for Organization-Wide CI/CD Security
Step Security Blog
GitHub's new custom runner images let you embed Harden-Runner directly into your infrastructure, providing automatic runtime protection across all workflows without modifying a single workflow file
4ヶ月前
記事のアイキャッチ画像
StepSecurity Is Now Available on Azure Marketplace
Step Security Blog
The StepSecurity App is now available on Azure Marketplace—simplifying procurement, deployment, and CI/CD security in one place.
4ヶ月前
記事のアイキャッチ画像
Critical Remote Code Execution Vulnerabilities Discovered in React Server Components and Next.js
Step Security Blog
CVE-2025-55182;CVE-2025-66478;reactjs;nextjs
4ヶ月前
記事のアイキャッチ画像
How Harden Runner Detected the Sha1-Hulud Supply Chain Attack in CNCF's Backstage Repository
Step Security Blog
A case study on detecting npm supply chain attacks through runtime monitoring and baseline anomaly detection
4ヶ月前
記事のアイキャッチ画像
Supply Chain Security Alert: eslint-config-prettier Package Shows Signs of Compromise
Step Security Blog
We are currently investigating a potential supply chain security incident involving the eslint-config-prettier npm package. This widely-used package, which helps developers maintain consistent code formatting by turning off ESLint rules that conflict with Prettier, appears to have had multiple versions published with suspicious modifications.
4ヶ月前
記事のアイキャッチ画像
9,000 Open-Source Projects Now Secured by Harden-Runner
Step Security Blog
StepSecurity Harden-Runner now protects 9,000+ open-source projects, delivering real-time CI/CD runtime security and defending pipelines against modern supply chain attacks.
4ヶ月前
記事のアイキャッチ画像
Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages
Step Security Blog
The Shai-Hulud worm has infected over 500 NPM packages including @ctrl/tinycolor in an unprecedented self-propagating supply chain attack. The malware harvests AWS/GCP/Azure credentials using TruffleHog, establishes persistence through GitHub Actions backdoors, and automatically spreads to other maintainer packages - marking the first successful worm attack in the NPM ecosystem.
4ヶ月前
記事のアイキャッチ画像
Introducing npm Package Search: Find Where Any Package Was Introduced Across Your GitHub Organizations
Step Security Blog
Instantly trace any npm package to its origin—across every repository, pull request, and contributor—with StepSecurity’s NPM Package Search.
5ヶ月前
記事のアイキャッチ画像
StepSecurity Is Sponsoring GitHub Universe 2025
Step Security Blog
We’re thrilled to announce that we are sponsoring GitHub Universe 2025 as a Bronze Sponsor — our very first booth at a major conference!
6ヶ月前
記事のアイキャッチ画像
s1ngularity: Popular Nx Build System Package Compromised with Data-Stealing Malware
Step Security Blog
s1ngularity attack hijacked Nx package on npm to steal cryptocurrency wallets, GitHub/npm tokens, SSH keys, and environment secrets - the first documented case of malware weaponizing AI CLI tools for reconnaissance and data exfiltration.
6ヶ月前
記事のアイキャッチ画像
Introducing StepSecurity Threat Intelligence: Real-Time Supply Chain Attack Alerts for Your SIEM
Step Security Blog
Protect your software supply chain with StepSecurity Threat Intelligence. Get real-time alerts on compromised packages, seamless SIEM integration, and actionable intelligence to reduce MTTD and MTTR.
7ヶ月前
記事のアイキャッチ画像
8,000 Strong: Harden-Runner's Growing Impact on CI/CD Security
Step Security Blog
StepSecurity’s Harden-Runner now protects 8,000+ repositories with EDR-style runtime monitoring for CI/CD pipelines, stopping supply chain attacks and securing GitHub Actions.
7ヶ月前
記事のアイキャッチ画像
Securing Google Gemini in GitHub Actions with Harden-Runner
Step Security Blog
Learn how to secure Google Gemini in GitHub Actions with Harden-Runner, combining observability with runtime monitoring for CI/CD security
7ヶ月前
記事のアイキャッチ画像
GhostAction Campaign: Over 3,000 Secrets Stolen Through Malicious GitHub Workflows
Step Security Blog
GitGuardian researchers discover massive supply chain attack affecting 817 repositories across 327 GitHub users. Malicious workflows exfiltrated 3,325 secrets including PyPI, npm, and DockerHub tokens through compromised developer accounts.
7ヶ月前
記事のアイキャッチ画像
Introducing the NPM Package Cooldown Check
Step Security Blog
We’re excited to announce the release of our NPM Package Cooldown Check, which helps teams block newly released, potentially compromised dependencies, while still allowing emergency fixes and integrating seamlessly into GitHub workflows
7ヶ月前
記事のアイキャッチ画像
Securing GitHub Copilot in GitHub Actions with Harden-Runner
Step Security Blog
Secure GitHub Copilot in CI/CD with StepSecurity Harden-Runner. Gain runtime visibility, block threats, and achieve true defense-in-depth.
7ヶ月前
記事のアイキャッチ画像
Calculate Your CI/CD Security ROI with StepSecurity's New ROI Calculator
Step Security Blog
The ROI Calculator provides instant visibility into your GitHub Actions security gaps and quantifies the value of addressing them.
7ヶ月前
記事のアイキャッチ画像
How StepSecurity Harden Runner Detected Unexpected Microsoft Defender Installation on GitHub-hosted Ubuntu Runners
Step Security Blog
Microsoft Defender was unexpectedly installed on multiple workflow runs from mid-July through mid-August, causing abnormal network traffic. StepSecurity Harden Runner detected this infrastructure anomaly within hours, and GitHub Support has since resolved the issue
7ヶ月前
記事のアイキャッチ画像
StepSecurity Harden Runner: Detect source code tampering during the build process
Step Security Blog
Learn how StepSecurity Harden-Runner detects source code tampering during the build process. Discover how real-time monitoring enhances CI/CD security by preventing unauthorized code modifications.
7ヶ月前
記事のアイキャッチ画像
Suspicious Tag Movement in AWS’s GitHub Action: What Happened and Why It Matters
Step Security Blog
How an AWS release rollback triggered the same red flags as a supply chain attack — and why treating every tag movement as suspicious is key to protecting your CI/CD pipelines
8ヶ月前
記事のアイキャッチ画像
When 'Changed Files' Changed Everything: Our Black Hat 2025 Presentation on the tj-actions Supply Chain Breach
Step Security Blog
We reveal how baseline-driven monitoring caught one of 2025's most consequential CI/CD supply chain attacks, exposing the vulnerability of 23,000+ repositories including those from GitHub, Meta, and Microsoft.
8ヶ月前
記事のアイキャッチ画像
Lessons from AWS CodeBuild’s Memory-Dump Incident (CVE-2025-8217)
Step Security Blog
How threat actors exploited AWS CodeBuild pipelines by stealing secrets from CI/CD memory—and the proactive defenses organizations can deploy to detect, respond to, and prevent such attacks.
8ヶ月前
記事のアイキャッチ画像
Supply Chain Security Alert: num2words PyPI Package Shows Signs of Compromise
Step Security Blog
Popular Python Package num2words v0.5.15 Published Without Repository Tag, Linked to Known Threat Actor
8ヶ月前
記事のアイキャッチ画像
When AI Meets CI/CD: Coding Agents in GitHub Actions Pose Hidden Security Risks
Step Security Blog
As organizations integrate AI coding agents into their development pipelines, new security considerations emerge. While these tools accelerate development, they require thoughtful security approaches to protect against novel attack vectors like Rules File Backdoor attacks and GITHUB_TOKEN compromise.
8ヶ月前
記事のアイキャッチ画像
The GitHub Warning Everyone Ignores: 'This Commit Does Not Belong to Any Branch'
Step Security Blog
Several popular GitHub Actions have release processes where the release commit does not belong to any branch on the action repository.
8ヶ月前
記事のアイキャッチ画像
8 GitHub Actions Secrets Management Best Practices to Follow
Step Security Blog
Discover GitHub Actions secrets management best practices to protect sensitive information in your CI/CD pipelines. Learn how to securely store, use, and manage secrets with actionable tips from StepSecurity.
8ヶ月前
記事のアイキャッチ画像
reviewdog GitHub Actions are compromised
Step Security Blog
reviewdog GitHub Actions are compromised
9ヶ月前
記事のアイキャッチ画像
7,000 Open-Source Projects Now Secured by Harden-Runner
Step Security Blog
StepSecurity’s Harden-Runner now protects over 7,000 GitHub repositories with real-time CI/CD runtime monitoring, threat detection, and supply chain security enforcement—backed by features like impostor commit alerts, process-based detections, and GitLab support.
9ヶ月前
記事のアイキャッチ画像
Replace Third-Party Actions with StepSecurity Maintained Actions via Automated Pull Requests
Step Security Blog
Policy Driven PRs now upgrade third-party Actions to StepSecurity Maintained versions across your entire organization
9ヶ月前
記事のアイキャッチ画像
StepSecurity Is Now Available on AWS Marketplace
Step Security Blog
The StepSecurity App is now available on AWS Marketplace—simplifying procurement, deployment, and CI/CD security in one place
9ヶ月前
記事のアイキャッチ画像
Introducing StepSecurity Artifact Monitor: Detect Unauthorized Software Releases in minutes, not months
Step Security Blog
StepSecurity Artifact Monitoring continuously watches your artifact registries to verify every release follows your approved CI/CD process. When attackers bypass your secure pipeline using compromised credentials, you'll know within minutes instead of months
9ヶ月前
記事のアイキャッチ画像
Introducing Workflow Run Policies: Guardrails for Blocking Non-Compliant GitHub Actions Runs
Step Security Blog
Workflow Run Policies enable you to block non-compliant GitHub Actions workflow runs, helping security and platform teams stop risky workflows before they execute
9ヶ月前
記事のアイキャッチ画像
Harden-Runner Detects New Traffic to release-assets.githubusercontent.com Across Multiple Customers
Step Security Blog
StepSecurity's Harden-Runner detected unexpected traffic to release-assets.githubusercontent.com across multiple GitHub Actions workflows, prompting a swift investigation. Learn how baseline monitoring caught this change, why it matters for CI/CD security, and how to stay protected.
9ヶ月前
記事のアイキャッチ画像
Grafana GitHub Actions Security Incident
Step Security Blog
On Saturday, April 26, 2025, Grafana Labs disclosed that an unauthorized user leveraged a vulnerability in a GitHub Actions workflow within a public Grafana Labs repository. This led to the exposure of a small number of secrets. Grafana Labs stated that their detections immediately triggered alerts, and the team responded by mitigating the vulnerability, rotating keys, and verifying that there was no access to production systems or data.
9ヶ月前
記事のアイキャッチ画像
Export Harden-Runner Security Insights and Detections to Amazon S3
Step Security Blog
Export Harden-Runner security insights and detections to Amazon S3 for real-time analysis, long-term storage, and seamless SIEM integration.
9ヶ月前
記事のアイキャッチ画像
Announcing Policy-Driven Automated Pull Requests for CI/CD Misconfiguration Remediation
Step Security Blog
Announcing Policy-Driven Automated Pull Requests for CI/CD Misconfiguration Remediation
9ヶ月前
記事のアイキャッチ画像
Why Compliance Auditors Are Looking at Your CI/CD Runners - And How to Prepare
Step Security Blog
CI/CD runners are a critical but often overlooked security risk. Learn how unmonitored runners can expose your pipelines to supply chain attacks and compliance gaps (PCI-DSS, SOC 2, HIPAA, ISO 27001). Discover how StepSecurity Harden-Runner enhances CI/CD security with real-time monitoring, egress control, and process tracking.
9ヶ月前
記事のアイキャッチ画像
Harden-Runner Flags Anomalous Outbound Call, Leading to Docker Documentation Update
Step Security Blog
Harden-Runner detected an unexpected outbound call from Docker across multiple customer environments. Surprisingly, it wasn’t listed in Docker’s allow list, and no EDR tool flagged it. Here’s how we identified it, reported it, and got it added to Docker’s documentation.
9ヶ月前
記事のアイキャッチ画像
StepSecurity Harden-Runner Now Secures GitHub Actions Workflows for Over 5,000 Open Source Projects
Step Security Blog
StepSecurity Harden-Runner secures over 5,000 open-source GitHub Actions workflows! Learn how it prevents CI/CD supply chain attacks, integrates with GitHub Checks, and provides real-time security insights.
9ヶ月前
記事のアイキャッチ画像
GitHub Actions Pwn Request Vulnerability
Step Security Blog
Learn about the 'Pwn Request' vulnerability in GitHub Actions, its risks, and how to secure workflows from exploitation. Discover best practices and tools like StepSecurity to protect against CI/CD threats.
9ヶ月前
記事のアイキャッチ画像
Prevent Ultralytics Style CI/CD Security Attacks with Network Security Controls
Step Security Blog
Discover how a CI/CD vulnerability in Ultralytics' GitHub Actions was exploited to inject a cryptominer, exfiltrate secrets, and poison build caches. Learn how StepSecurity Harden-Runner detects and mitigates such threats with advanced runtime monitoring and network egress controls, safeguarding CI/CD pipelines from supply chain attacks.
9ヶ月前
記事のアイキャッチ画像
PyTorch Supply Chain Compromise
Step Security Blog
Explore how a vulnerability in PyTorch's CI/CD pipeline exposed critical risks of self-hosted runners, enabling attacks on secrets, software releases, and cloud resources. Learn prevention strategies with StepSecurity's Harden Runner.
9ヶ月前
記事のアイキャッチ画像
Unified Network Egress View: Centralize GitHub Actions Network Destinations for Your Enterprise
Step Security Blog
Discover StepSecurity’s Unified Network Egress View for GitHub Actions. Learn how to centralize and monitor network destinations across your enterprise to enhance CI/CD security and prevent data exfiltration.
9ヶ月前
記事のアイキャッチ画像
Top 2024 Predictions for CI/CD Security
Step Security Blog
Explore key CI/CD security trends for 2024, including shifts to modern platforms, third-party component risks, rising security incidents, and the growing need for secure pipelines. Learn how to protect your organization from evolving threats in the CI/CD landscape.
9ヶ月前
記事のアイキャッチ画像
Uniting Developers and Security: Celebrating the Success of 500+ Open Source Projects Using StepSecurity's Orchestration Platform
Step Security Blog
StepSecurity's orchestration platform is now securing 500+ open-source projects! Celebrate this milestone and learn how our platform unites developers and security teams to protect CI/CD workflows.
9ヶ月前
記事のアイキャッチ画像
5 Effective Third-Party GitHub Actions Governance Best Practices
Step Security Blog
Secure your GitHub workflows with best practices for managing third-party GitHub Actions. Learn about risks, policies, code auditing, forking, pinning, and author verification to enhance CI/CD security.
9ヶ月前
記事のアイキャッチ画像
StepSecurity Recognized Among CRN’s "10 Hottest DevOps Startups Of 2024"
Step Security Blog
StepSecurity is honored to be recognized among CRN's 10 Hottest DevOps Startups of 2024! Discover how we're transforming CI/CD security and protecting GitHub Actions workflows worldwide.
9ヶ月前
記事のアイキャッチ画像
Streamline Your GitHub Actions Workflows with StepSecurity’s Latest Feature
Step Security Blog
Streamline your GitHub Actions workflows with StepSecurity! Learn how to automate security best practices, manage token permissions, and protect your CI/CD pipelines from supply chain attacks.
9ヶ月前
記事のアイキャッチ画像
StepSecurity Steps Up the Security Game with SOC 2 Type 2 Compliance
Step Security Blog
StepSecurity has achieved SOC 2 Type 2 compliance, strengthening its commitment to security and data protection. Learn how this milestone enhances trust and ensures secure CI/CD solutions for organizations.
9ヶ月前
記事のアイキャッチ画像
StepSecurity's Alignment with CISA's CI/CD Security Guidance
Step Security Blog
Learn how StepSecurity aligns with CISA's CI/CD security guidance to help organizations protect their CI/CD pipelines. Discover key security practices and how StepSecurity automates compliance.
9ヶ月前
記事のアイキャッチ画像
StepSecurity Joins the Open Source Security Foundation (OpenSSF)
Step Security Blog
StepSecurity has joined the Open Source Security Foundation (OpenSSF)! Learn how this collaboration strengthens our mission to enhance open-source software security and protect CI/CD pipelines.
9ヶ月前
記事のアイキャッチ画像
StepSecurity's Big Step: Announcing Our $3M Seed Funding!
Step Security Blog
StepSecurity secures $3M seed funding to revolutionize CI/CD pipeline security. Learn about our mission, unique approach, and roadmap to protect open-source and enterprise CI/CD environments.
9ヶ月前