GitHub Actions Supply Chain Scanner
Detect compromised or drifted action tags before they run in your CI pipeline
Supply chain attacks on GitHub Actions work by silently re-pointing a mutable tag — like actions/checkout@v4 — to a malicious commit. SecOSS scans every uses: reference in your .github/workflows/ files, resolves each tag to its current commit SHA, and compares against the previous scan. Any SHA change is flagged CRITICAL — a strong indicator of a compromised action.
How to use
- 1Enter your GitHub repository URL. SecOSS fetches all YAML files from .github/workflows/ and parses every uses: line.
- 2Each action tag (e.g. actions/checkout@v4) is resolved to its current commit SHA via the GitHub API.
- 3Results show which tags are SHA-pinned (safe), unpinned (mutable risk), or drifted (SHA changed since last scan).
- 4Run again later — if any SHA has changed since your previous scan, it is flagged CRITICAL as a possible supply chain attack.
Scan method