Replies: 6 comments 6 replies
-
|
Anyone? |
Beta Was this translation helpful? Give feedback.
-
|
IP restriction is a precautionary step taken while we were remediating the latest security incident. It isn't supposed to affect public repositories or assets. We will re-evalate this restriction soon as we resume normal operation. As far as I know, the |
Beta Was this translation helpful? Give feedback.
-
|
Same issue here, both with mise (without lock) or by our custom Action that wraps the Trivy binary for security checks even for an unaffected v0.69.3 🤔 |
Beta Was this translation helpful? Give feedback.
-
|
This behavior seems problematic to me — blocking authenticated non-member users from accessing public resources appears to provides no security benefit and breaks legitimate use cases like yours. I've opened a discussion on the GitHub community forum to clarify whether this is intentional: |
Beta Was this translation helpful? Give feedback.
-
|
This is also a problem for us - we use a couple API requests to pin and verify an image by it's tag, using GH to avoid some Docker calls. We could switch to querying the Docker registry directly, but we've already got a process built around querying GH releases (and related artifacts). |
Beta Was this translation helpful? Give feedback.
-
|
This IP limitation breaks our automated updates with Renovate. We have scheduled pipeline in GitHub Actions which runs Renovate with a rule: to be able to update config like this: We define Please reconsider this approach, as currently it's limiting our security workflow. |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
Description
When attempting to verify a release using the GitHub CLI in a CI environment, the operation fails due to the IP allow list enforced by the Aqua Security GitHub org.
The following command works locally (with a fine-grained PAT), but fails in CI:
Error
While an IP allow list is a meaningful security control, in this case, it (likely unintentionally) blocks legitimate, security-relevant use cases, representing a supply-chain security limitation for downstream users:
gh release verify)GitHub explicitly promotes release verification as part of securing the software supply chain1 and references it in its documentation for immutable releases2. Please consider relaxing this restriction, or explicitly allowing GitHub-hosted runner CIDR ranges, to permit read-only operations required for release integrity verification of this public repository.
Desired Behavior
Release attestation verification via
gh release verifysucceeds in CI environment.Actual Behavior
The request is denied with HTTP 403 due to the organization's IP allow list restrictions.
Reproduction Steps
Target
None
Scanner
None
Output Format
None
Mode
None
Debug Output
Operating System
N/A
Version
Checklist
trivy clean --allFootnotes
https://docs.github.com/en/code-security/how-tos/secure-your-supply-chain/secure-your-dependencies/verifying-the-integrity-of-a-release ↩
https://docs.github.com/en/code-security/concepts/supply-chain-security/immutable-releases#next-steps ↩
Beta Was this translation helpful? Give feedback.
All reactions