Software supply chain attacks hit GitHub Actions repeatedly in the past year. The tj-actions/changed-files, Nx, and trivy-action incidents all followed the same pattern: attackers targeted CI/CD automation directly, exploiting mutable dependencies, over-permissioned credentials, and unrestricted network access to propagate malicious code across thousands of repositories simultaneously. GitHub's 2026 security roadmap is a direct response.

The roadmap targets three layers: ecosystem integrity, attack surface reduction, and infrastructure controls. The most concrete near-term change is workflow-level dependency locking, a dependencies: section in workflow YAML that pins all direct and transitive dependencies to commit SHAs. The model is Go's go.mod and go.sum. Public preview lands in 3 to 6 months, general availability at 6 months. Hash mismatches halt execution before any job runs. Composite actions can no longer hide nested dependencies. Alongside this, GitHub is moving toward immutable releases for published actions and introducing centralized policy controls built on the existing ruleset framework, letting organizations define who can trigger workflows and which events are permitted without auditing individual YAML files.

The full post is worth reading for the specifics on Pwn Request attack vectors, the exact mechanics of transitive dependency resolution, and the policy dimensions being designed into the ruleset framework. The roadmap is still incomplete in the published version, so watching how GitHub fills in the attack surface and infrastructure sections will tell you how seriously they are treating runner-level network boundaries and real-time observability.

[READ ORIGINAL →]