Sourced from step-security/harden-runner's releases.
v2.12.1
What's Changed
- Detection capabilities have been upgraded to better recognize attempts at runner tampering. These improvements are informed by real-world incident learnings, including analysis of anomalous behaviors observed in the tj-actions and reviewdog supply chain attack.
- Resolved an issue where the block policy was not enforced correctly when the GitHub Actions job was running inside a container on a self-hosted VM runner.
Full Changelog: https://github.com/step-security/harden-runner/compare/v2...v2.12.1
002fdce
Merge pull request #544
from step-security/rc-212489e3f
Merge branch 'main' into rc-2175dd441
Merge pull request #555
from step-security/dependabot/github_actions/step-sec...4381ace
Bump step-security/publish-unit-test-result-action from 2.19.0 to
2.20.0a9da90b
Merge pull request #553
from h0x0er/feat/container-workflowsa60ef21
update4ad512f
Merge branch 'rc-21' into feat/container-workflows6b41a39
fixed test casefa70c45
update agenteb47845
self-hosted: refactored block-policy apply logic