Skip to content

security: wave 1 fixes (critical + high + blocking medium)#3

Merged
govindkavaturi-art merged 1 commit intomainfrom
security/wave-1
Apr 12, 2026
Merged

security: wave 1 fixes (critical + high + blocking medium)#3
govindkavaturi-art merged 1 commit intomainfrom
security/wave-1

Conversation

@govindkavaturi-art
Copy link
Copy Markdown
Member

Summary

  • Critical: Enable 2FA enforcement on cueapi GitHub org (verified all members have 2FA)
  • High: Pin all GitHub Actions to commit SHAs instead of mutable version tags
  • High: Set required_approving_review_count: 1 on main branch protection
  • High: Add release.yml workflow with npm publish --provenance for provenance attestation
  • Medium: Add explicit permissions: { contents: read } to CI workflow
  • Medium: Add publishConfig.access: public to package.json

Addresses findings #1, #2, #3, #4, #5, #9 from the security audit.

Test plan

  • CI passes (typecheck, lint, test, build, bundle size)
  • Verify branch protection updated via gh api repos/cueapi/cuechain/branches/main/protection
  • Verify org 2FA via gh api orgs/cueapi --jq .two_factor_requirement_enabled
  • Verify release workflow triggers on version tags (manual test after merge)

🤖 Generated with Claude Code

- Pin GitHub Actions to commit SHAs (actions/checkout, pnpm/action-setup, actions/setup-node)
- Add explicit permissions: { contents: read } to CI workflow
- Create release.yml workflow with npm provenance attestation
- Add publishConfig.access: public to package.json
- Set required_approving_review_count: 1 on main branch protection
- Enable org-level 2FA enforcement on cueapi org

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@govindkavaturi-art govindkavaturi-art merged commit 5dd3ce0 into main Apr 12, 2026
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant