From 631e611eeba61ec420846d8c456107a241cf56d7 Mon Sep 17 00:00:00 2001
From: Ashish Kurmi <100655670+ashishkurmi@users.noreply.github.com>
Date: Fri, 14 Mar 2025 15:03:53 -0700
Subject: [PATCH] Update README.md
---
README.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/README.md b/README.md
index 64b18942..7764305f 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,4 @@
-# GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
+# GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
[](https://stepsecurity.io/?utm_source=github&utm_medium=organic_oss&utm_campaign=harden-runner)
[](https://raw.githubusercontent.com/step-security/harden-runner/main/LICENSE)
@@ -83,4 +83,4 @@ GitHub Actions Goat not only demonstrates vulnerabilities but also presents solu
| 2. | Lack of CI/CD Runtime Security can lead to Tampering of Source Code or Artifacts during Build | [GitHub Actions Runtime Security - Detect File Tampering](docs/Solutions/MonitorSourceCode.md) | ["Implement endpoint detection and response (EDR) tools" in CISA/NSA guide](https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF) |
| 3. | Lack of Detailed Audit Logs for CI/CD Activities | [Forensically Reconstruct An Incident Post-Compromise](docs/Solutions/ForensicAnalysis.md) | ["Keep audit logs" section in CISA/NSA guide](https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF) |
| 4. | Use of Long-Term CI/CD Credentials | [Audit and rotate registered secrets](docs/Solutions/AuditGitHubActionsSecrets.md) | 1. ["Audit and rotate secrets" in GitHub's Security Guide](https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-secrets)
2. ["Using OpenID Connect to access cloud resources" in GitHub's Security Guide](https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-openid-connect-to-access-cloud-resources)
3. ["Minimize the use of long-term credentials" in CISA/NSA document](https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF) |
-| 5. | Use of Untrusted 3rd Party GitHub Actions | [Review GitHub Actions used across your Organization](docs/Solutions/ReviewGitHubActions.md) | 1. ["Using 3rd party Actions" in GitHub's Security Guide](https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)
2. ["Restrict untrusted libraries and tools" section in CISA/NSA document](https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF) |
\ No newline at end of file
+| 5. | Use of Untrusted 3rd Party GitHub Actions | [Review GitHub Actions used across your Organization](docs/Solutions/ReviewGitHubActions.md) | 1. ["Using 3rd party Actions" in GitHub's Security Guide](https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)
2. ["Restrict untrusted libraries and tools" section in CISA/NSA document](https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF) |