You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the solution you'd like
Maybe a check that encourages adding atleast one tag protection rule on existing releases. Ideally a "*" would be nice, so only admins can have those perms to replace/delete releases.
Describe alternatives you've considered
None
Additional context
None
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
Right now, a write/maintain role contributor can delete existing releases and replace with releases pointing to older, vulnerable commits. Read why - https://medium.com/boostsecurity/slsa-dip-source-of-the-problem-a1dac46a976. Have your release tags protected - https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/managing-repository-settings/configuring-tag-protection-rules
Describe the solution you'd like
Maybe a check that encourages adding atleast one tag protection rule on existing releases. Ideally a "*" would be nice, so only admins can have those perms to replace/delete releases.
Describe alternatives you've considered
None
Additional context
None
The text was updated successfully, but these errors were encountered: