Bump golang from 1.21-alpine to 1.26-alpine #12
Closed
StepSecurity Actions Security / StepSecurity Harden-Runner
succeeded
Apr 21, 2026 in 2m 35s
No anomalous activity on CI/CD runners
No new Harden-Runner detections for this pull request.
Details
Harden-Runner monitors all outbound traffic from each job at the DNS and network layers to ensure that CI/CD runners do not communicate with unauthorized destinations.
This reduces the risk of CI/CD secrets and source code being exfiltrated.
📋 Monitored GitHub Actions workflow runs
The following GitHub Actions workflow runs were monitored as part of this pull request.
| Workflow | Run ID | Unique Destinations | Actions Used | Detailed Insights |
|---|---|---|---|---|
| claude_review.yml | 24729802954 | 1 | 4 | View Insights |
| pull-requests.yml | 24729802691 | 9 | 3 | View Insights |
| dependency-review.yml | 24729802656 | 2 | 3 | View Insights |
| codeql.yml | 24729802621 | 6 | 3 | View Insights |
| claude_review.yml | 24729804259 | 1 | 4 | View Insights |
| auto_cherry_pick.yml | 24729802939 | - | - | Harden-Runner not enabled |
| auto_cherry_pick.yml | 24729803087 | - | - | Harden-Runner not enabled |
| claude_review.yml | 24729803063 | 1 | 4 | View Insights |
| auto_cherry_pick.yml | 24729804659 | - | - | Harden-Runner not enabled |
📚 Learn More
You can learn more about this GitHub check here
Loading