| name | hardened-release-workflow |
| description | Production-ready release workflow examples with signed releases, SLSA provenance, artifact attestations, and minimal permissions. |
Hardened Release Workflow
When to Use This Skill
Copy-paste ready release workflow templates with comprehensive security hardening. Each example demonstrates signed releases, SLSA provenance generation, artifact attestations, minimal permissions, and secure artifact distribution.
Complete Security Patterns
These workflows integrate all security patterns from the hub: SHA-pinned actions, minimal GITHUB_TOKEN permissions, SLSA provenance, artifact attestations, signature verification, and secure distribution. Use as production templates for secure software supply chain.
Implementation
See the full implementation guide in the source documentation.
Key Principles
Every release workflow in this guide implements these controls:
- Action Pinning: All third-party actions pinned to full SHA-256 commit hashes
- Minimal Permissions: Only required permissions granted per job
- SLSA Provenance: Build provenance attestations for supply chain transparency
- Artifact Attestations: Cryptographic signatures for release artifacts
- Signature Verification: Verifiable release authenticity
- Immutable Releases: Tag protection and commit verification
- Approval Gates: Environment protection for production releases
Examples
See examples.md for code examples.
Full Reference
See reference.md for complete documentation.