pin github actions by hash #2765
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Rollback Plan
If a change needs to be reverted, we will publish an updated version of the library.
Changes to Security Controls
Are there any changes to security controls (access controls, encryption, logging) in this pull request? If so, explain.
Description
I've noticed that this project is pinning most of its GitHub Action dependencies by referencing a commit hash. This is great, as it ensures that the workflows are both stable and secure. It is a security best practice, endorsed by GitHub, and prevents security incidents such as CVE-2025-30066, aka the "tj-actions/changed-files supply chain attack".
However the following actions were not pinned:
I was not able to find any legitimate reason in the git history or issues, so I assume these were just overlooked.
This PR pins the actions to match the best practice followed by the other workflows in this repository.
Acceptance tests
Output from acceptance testing:
N/A no changes to code tested by this
Release Note
Release note for CHANGELOG:
References
Community Note