You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,11 +21,11 @@ Lets kick things off with a challenge designed to get your analytical gears turn
21
21
- This workflow uses the [Harden-Runner GitHub Action](https://github.com/step-security/harden-runner), which provides Security Observability and Runtime Enforcement for GitHub Actions workflows.
22
22
- Now, we present you with the puzzle. Check out these [network events monitored during a workflow run](https://app.stepsecurity.io/github/step-security/github-actions-goat/actions/runs/6285441645) of this workflow. Notice anything odd?
23
23
24
-
**Why is there an outbound call to `pastebin.com` during the workflow run?** Is this expected, or something more nefarious?
24
+
**Why is there an outbound call to `attacker.com` during the workflow run?** Is this expected, or something more nefarious?
25
25
26
26
> For the answer of the puzzle, check out the first hands-on tutorial on [Filtering Egress Network Traffic](./docs/Solutions/RestrictOutboundTraffic.md) from a GitHub Actions workflow run.
27
27
28
-
<imgsrc="./images/Puzzle3.png"alt="Puzzle showing outbound call to pastebin.com" >
28
+
<imgsrc="./images/Puzzle4.png"alt="Puzzle showing outbound call to attacker.com" >
Copy file name to clipboardExpand all lines: docs/Solutions/RestrictOutboundTraffic.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,16 +33,16 @@ As we will see next, one of these steps is making an unexpected outbound call, b
33
33
34
34
5. Click the link and you will see the outbound calls that were made from each of the steps.
35
35
36
-
You can now see that the `npm install` step is making a call to `pastebin.com`, which is not expected.
36
+
You can now see that the `npm install` step is making a call to `attacker.com`, which is not expected.
37
37
38
38
### Answer to the puzzle
39
39
40
-
There is a [Puzzle in the README](../../README.md#puzzle-time) about a call to `pastebin.com`. To understand why this call is being made:
40
+
There is a [Puzzle in the README](../../README.md#puzzle-time) about a call to `attacker.com`. To understand why this call is being made:
41
41
42
42
- Check out the `package.json` file of the [exfiltration-demo](../../src/exfiltration-demo/package.json) folder.
43
43
- It has a dependency called `@step-security/malware-simulator`
44
44
- This dependency simulates a malicious package. Its [package.json](../../src/malware-simulators/exfiltration-simulator/package.json) has a `pre-install` step that calls [compile.js](../../src/malware-simulators/exfiltration-simulator/compile.js)
45
-
- The compile.js file makes an outbound call to `pastebin.com`
45
+
- The compile.js file makes an outbound call to `attacker.com`
46
46
- As a result, when `npm install` is run in the workflow, the `pre-install` step of the dependency is run, which makes the outbound call.
47
47
48
48
### Network Filtering with Harden-Runner
@@ -53,11 +53,11 @@ Now lets see how to filter traffic to expected destinations and block everything
53
53
54
54
2. View the workflow [hosted-network-filtering-hr.yml](../../.github/workflows/hosted-network-filtering-hr.yml) file.
55
55
56
-
3.`step-security/harden-runner` GitHub Action has `egress-policy` set to `block`. Only the destinations that are expected are in the allowed list. `pastebin.com` is not in this list.
56
+
3.`step-security/harden-runner` GitHub Action has `egress-policy` set to `block`. Only the destinations that are expected are in the allowed list. `attacker.com` is not in this list.
57
57
58
58
4. After the workflow completes, check out the build logs.
59
59
60
-
5. Click the insights link from the `Harden-Runner` step. You will notice that the call to `pastebin.com` was blocked in this case.
60
+
5. Click the insights link from the `Harden-Runner` step. You will notice that the call to `attacker.com` was blocked in this case.
61
61
62
62
6. You can also install the [StepSecurity Actions Security GitHub App](https://github.com/apps/stepsecurity-actions-security) to get notified via email or Slack when outbound traffic is blocked.
63
63
@@ -127,4 +127,4 @@ While there is a secure-by-default policy, to filter traffic to specific destina
0 commit comments