Claude Code Plugins

Community-maintained marketplace

Feedback

third-party-action-risk-assessment

@adaptive-enforcement-lab/claude-skills
0
0

>-

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name third-party-action-risk-assessment
description Structured framework for evaluating GitHub Actions security before adoption. Trust tiers, risk assessment checklist, and decision tree for action evaluation.

Third-Party Action Risk Assessment

When to Use This Skill

Trust but verify. Every third-party action you adopt into your workflows executes with access to your secrets, code, and deployment infrastructure. Know what you're trusting.

The Risk

Third-party actions run arbitrary code inside your CI/CD pipeline with full access to repository secrets, cloud credentials, and source code. A malicious or compromised action can exfiltrate everything, deploy backdoors, or modify your codebase.

Implementation

See the full implementation guide in the source documentation.

Key Principles

Always SHA pin third-party actions: Tag references can be mutated. SHA pins are immutable.

# Bad - tag reference
- uses: community/action@v2

# Good - SHA pinned with version comment
- uses: community/action@a1b2c3d4e5f6...  # v2.1.0

Review action source code before first use: Never trust based on stars or README alone. Read the actual implementation.

Fork critical actions to organization control: Removes dependency on external maintainer. Gives you control over updates.

Monitor for action updates: Use Dependabot to track new versions. Review changelogs before updating.

Minimize permissions: Grant actions only what they need. Use job-level scoping to limit scope.

Isolate high-risk workflows: Run untrusted actions in separate jobs with minimal permissions and no secret access.

Audit action usage quarterly: Review which actions are in use. Re-assess risk as threat landscape evolves.

Have an exit strategy: Know how to replace or remove every action if it becomes compromised or unmaintained.

Examples

See examples.md for code examples.

Full Reference

See reference.md for complete documentation.

References