Tous les articles

Introducing Chainguard Actions: CI/CD workflows you can trust

Ross Gordon, Staff Product Marketing Manager, and Reid Tatoris, VP, Product Management

Today, we’re introducing Chainguard Actions: a securely rebuilt catalog of GitHub Actions and similar CI/CD workflows built and continuously maintained in the Chainguard Factory.

CI/CD pipelines are the most privileged systems in modern software delivery. They have access to repository write permissions, deployment credentials, signing keys, and production infrastructure. Yet the workflows running inside those pipelines often come from unaudited third-party sources.

Every time a team adds a CI/CD workflow from a community marketplace to their workflow, they grant that code direct access to sensitive tokens, secrets, and build environments.

As development accelerates and AI agents begin generating code and pull requests autonomously, this layer of the software supply chain is under more pressure than ever.

Chainguard Actions provides a trusted foundation for CI/CD workflows, enabling developers and AI coding agents to ship software quickly without the supply chain risk.

The most privileged layer of open source

Modern development workflows rely heavily on reusable CI/CD automation.

Actions handle dependency installation, artifact publishing, container builds, and deployment orchestration. They are pulled directly from public repositories and executed with elevated privileges in CI environments.

Unlike container images and language dependencies, which benefit from numerous security vendors and compliance mandates, CI/CD workflows have historically lacked meaningful security and compliance controls.

Workflows can contain unsafe shell expressions, token exposure risks, or insecure input handling that create pathways to repository compromise or infrastructure access.

Because these workflows execute inside the delivery pipeline, the blast radius of a compromise can be significant, impacting any release or code that passes through it.

As AI-assisted development accelerates the volume of pull requests and pipeline executions, the blast radius of any CI/CD compromise grows with it. Coding agents generating automation and integration code at scale have no threat model. They won't flag an Action that quietly exfiltrates secrets or backdoors a build artifact. Every execution runs with the same elevated privileges, and none of them are reviewing what they're running.

Chainguard Actions addresses this major vulnerability by delivering secure-by-default workflows that developers can trust.

Hardened CI/CD workflows built in the Chainguard Factory

Chainguard Actions are built using the same AI-powered software factory that produces all of Chainguard’s secure-by-default artifacts, including Containers, Libraries, OS Packages, and Agent Skills.

The process begins by ingesting publicly verifiable third-party CI/CD workflows used across the open source ecosystem, starting with the 20,000 GitHub Actions published in the community marketplace. These workflows are automatically analyzed against known attack patterns and security risks.

Hardening agents review each automation script and apply fixes to eliminate unsafe patterns such as script injection vulnerabilities, insecure environment variable handling, or unsafe command interpolation.

Each improvement is applied transparently, with an auditable record of the changes Chainguard makes to enhance the Action's security.

Once the action reaches its hardened state, it is published as a verified artifact that organizations can consume confidently in their pipelines.

This process creates CI/CD workflows that are continuously evaluated and improved over time. As new exploit techniques are discovered, all Chainguard Actions are re-secured accordingly.

Real-world vulnerabilities in widely used actions

We are already seeing the value of our approach in securing the CI/CD workflows that developers and AI coding agents use today.

For example, the anthropics-claude-code-action, Anthropic’s general-purpose Claude agent for GitHub PRs and issues, contained a high-severity script injection vulnerability.

In the original implementation, a GitHub token generated earlier in the workflow was interpolated directly into a shell command inside a run: block:

Authorization: Bearer ${{ steps.run.outputs.github_token }}

If the step output were ever influenced by attacker-controlled input, this pattern could allow shell injection inside the CI runner environment.

Our hardening agent detected the vulnerability and automatically remediated it.

The fix moved the token into an environment variable and referenced it safely within the shell command:

env:
  REVOKE_TOKEN: ${{ steps.run.outputs.github_token }}

The curl command now references the environment variable:

Authorization: Bearer $REVOKE_TOKEN

This change prevents a shell injection by ensuring the token is treated strictly as a value rather than executable shell input.

Like this example, each vulnerability identified during the hardening process is documented in an auditable hardening report that explains the issue and the remediation applied.

Your pipeline’s top actions, secured

Chainguard Actions focuses on the CI/CD workflows developers use most frequently in production pipelines.

Initial coverage includes widely used GitHub Actions that support common build, testing, and deployment workflows.

Examples include Actions used to:

  • Build and publish container images

  • Install language runtimes such as Go, Node.js, and Python

  • Cache dependencies for faster builds

  • Detect changed files during CI runs

  • Run code quality and security checks

These Actions represent critical building blocks in thousands of pipelines across the open source ecosystem, and customers can set them up in their GitHub repository in under 30 seconds.

All it takes is navigating to your GitHub repository’s Actions settings page, selecting the bottom option that indicates your repository can use any workflow that matches specific criteria, and entering in chainguard-actions/*.

By securing and maintaining these workflows in the Chainguard Factory, organizations can continue using essential workflows while reducing the risk of third-party manipulation.

Built for developer or AI-written code

AI coding agents are transforming how software is written and deployed. These tools can generate large volumes of code, automatically open pull requests, and trigger CI/CD workflows continuously. The speed of development is increasing, and so too is the risk to your CI/CD pipelines.

In this environment, CI/CD pipelines must remain both fast and trustworthy. Automation scripts cannot become a hidden attack vector that undermines the integrity of the delivery pipeline.

Chainguard Actions provides a foundation for CI/CD automation that developers and AI agents can run safely at scale.

Chainguard Actions is available today in beta. To start protecting your most privileged open source artifact, get on the Chainguard Actions waitlist.

Share this article

Articles connexes

Vous souhaitez en savoir plus sur Chainguard?

Contactez-nous