Skip to content

Add zizmor and frizbee CI checks#1577

Closed
tashian wants to merge 5 commits intomasterfrom
carl/add-zizmor-frizbee
Closed

Add zizmor and frizbee CI checks#1577
tashian wants to merge 5 commits intomasterfrom
carl/add-zizmor-frizbee

Conversation

@tashian
Copy link
Contributor

@tashian tashian commented Mar 3, 2026

Summary

  • Add caller workflows for zizmor (GitHub Actions security scanner) and frizbee (action pinning checker)
  • Fix zizmor findings (template injection, bot-conditions) where applicable
  • Add .github/zizmor.yml suppression config for intentional patterns (e.g. @main refs to shared workflows)

These tools complement the existing actionlint check. The reusable workflows live in smallstep/workflows and are now on main.

Test plan

  • CI passes (zizmor + frizbee + existing checks)

🤖 Generated with Claude Code

Add caller workflows for zizmor (security scanning) and frizbee
(action pinning verification). Fix zizmor findings where applicable
and add suppression config for intentional patterns.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@github-actions github-actions bot added the needs triage Waiting for discussion / prioritization by team label Mar 3, 2026
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

tashian and others added 4 commits March 2, 2026 17:55
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Use unpinned-uses config.policies with org-level wildcard and
secrets-inherit disable instead of brittle per-line ignores that
break whenever workflow files change.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
The ref-confusion audit crashes when workflows reference private
repos (e.g. internal-workflows, robot) because the GITHUB_TOKEN
lacks cross-repo access. Disable until zizmor supports scoping
this audit or we provide a broader token.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
The caller workflow's permissions are the ceiling for reusable
workflows. The zizmor-action needs security-events: write to
upload SARIF results to GitHub Advanced Security.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@tashian tashian closed this Mar 3, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

needs triage Waiting for discussion / prioritization by team

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant