Towards a secure by default GitHub Actions #179107
Replies: 8 comments 17 replies
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
I love this! There are a few other things on my wish list:
|
Beta Was this translation helpful? Give feedback.
-
Security improvements to
|
Beta Was this translation helpful? Give feedback.
-
|
Thanks! Definitely a good thing that the security risks of What I am wondering though is if the change of environment branch protection rules related to Or am I misunderstanding this? |
Beta Was this translation helpful? Give feedback.
-
|
This is exciting. Finally some major changes to the threat model of GitHub Actions and this thread is great news for more transparency towards future changes. |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
|
I don't know if this is in-scope, but I know some people have been hesitant to move to Trusted Publishing because you can't force 2FA to approve deployments from GitHub environments, which feels related, so I thought it was worth surfacing over here as well. |
Beta Was this translation helpful? Give feedback.
-
|
I like the work done on immutable releases, any plan to enable it on repos by default? |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
Why are you starting this discussion?
Product Feedback
What GitHub Actions topic or product is this about?
Workflow Configuration
Discussion Details
Today, GitHub announced upcoming changes to the
pull_request_targetevent, and environment protection rules. This is one of the first steps in a broader roadmap to make GitHub Actions more secure by default and we want to use this discussion post for collaboration and feedback on the changes we have planned towards this goal.Historical context
Back in 2020, we introduced
pull_request_targetto help repositories run trusted workflows when pull requests are opened. Unlikepull_request, this event runs with the repository’s configuredGITHUB_TOKENpermissions and other secrets, enabling deeper automation. That power comes with risk and this behavior has led to a number of impactful vulnerabilities in Action workflows. Becausepull_request_targetexecutes based on user-supplied pull requests, vulnerability patterns like pwn requests and script injection have shown how this flexibility coupled with a lack of an understanding of these security risks can lead to secret exfiltration or execution of untrusted code. The new behaviors scheduled for December 8, 2025 start to reduce these risks by anchoring execution to trusted, default-branch workflow definitions, allowing clearer remediation of vulnerabilities inpull_request_targetworkflows, and aligning environment policy evaluation with the workflow code that is executed.What’s next?
We know more control and restrictions are needed to ensure these risky event types can be properly understood, governed, and restricted. Soon, we’ll update the public roadmap to share all of our priorities in this space, helping secure the workflows and code of millions of developers around the world.
This discussion is for collaboration and feedback. What changes or controls around♥️ to hear your thoughts on these initial changes and any constructive feedback you have as we refine our roadmap towards a secure by default GitHub Actions.
pull_request_targetor other functionality in Actions do you think would have an immediate impact on the security of Action workflows and the supply chains they power? With enforcement starting on 12/8/2025, we’dLooking forward to collaborating,
@Steve-Glass (Senior Product Manager - Actions) & @gregose (Principal Product Security Engineer)
Beta Was this translation helpful? Give feedback.
All reactions