Skip to content

deps: bump step-security/harden-runner from 2.19.0 to 2.19.1#55

Merged
github-actions[bot] merged 1 commit into
mainfrom
dependabot/github_actions/step-security/harden-runner-2.19.1
May 12, 2026
Merged

deps: bump step-security/harden-runner from 2.19.0 to 2.19.1#55
github-actions[bot] merged 1 commit into
mainfrom
dependabot/github_actions/step-security/harden-runner-2.19.1

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 12, 2026

Bumps step-security/harden-runner from 2.19.0 to 2.19.1.

Release notes

Sourced from step-security/harden-runner's releases.

v2.19.1

What's Changed

What the fix changes

  • Harden-Runner will detect ubuntu-slim runners and exit cleanly with an informational log message, instead of post harden runner step failing on chown: invalid user: 'undefined'.

What the fix does not do

  • Jobs running on ubuntu-slim will not be monitored by Harden-Runner. The agent relies on kernel-level features (that require elevated capabilities).
  • Per GitHub's docs on single-CPU runners: "The container for ubuntu-slim runners runs in unprivileged mode. This means that some operations requiring elevated privileges such as mounting file systems, using Docker-in-Docker, or accessing low-level kernel features are not supported." Those low-level kernel features are what the agent needs, so monitoring inside the unprivileged container is not feasible today.

For StepSecurity enterprise customers If your security posture requires that workflows are always monitored, you can block the use of ubuntu-slim via workflow run policies see the Runner Label Policy docs. This lets you enforce that jobs only run on monitored runner types.

New Contributors

Full Changelog: step-security/harden-runner@v2.19.0...v2.19.1

Commits
  • a5ad31d Merge pull request #657 from devantler/fix/ubuntu-slim-user-env
  • 6e92856 build dist and trim ubuntu-slim message
  • 4e0504e Merge branch 'main' into fix/ubuntu-slim-user-env
  • 376d25a fix: detect ubuntu-slim runners early and bail out
  • See full diff in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [step-security/harden-runner](https://github.com/step-security/harden-runner) from 2.19.0 to 2.19.1.
- [Release notes](https://github.com/step-security/harden-runner/releases)
- [Commits](step-security/harden-runner@8d3c67d...a5ad31d)

---
updated-dependencies:
- dependency-name: step-security/harden-runner
  dependency-version: 2.19.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels May 12, 2026
@github-actions
Copy link
Copy Markdown

Dependency Security Scan

Packages scanned: step-security/harden-runner (v2.19.1)

Results

No known exploits found affecting the target versions.

Source Vulnerabilities
GitHub Advisory (GHSA) 0 affecting target
OSV.dev 0 affecting target

Auto-merge has been enabled. This PR will merge once all status checks pass.

5 historical advisory/ies (patched at or before target version — not blocking)
ID Severity Summary Source Patched In
GHSA-46g3-37rh-v698 MODERATE Egress Policy Bypass via DNS over HTTPS (DoH) in Harden-Runner (Community Tier) GHSA 2.16.0
GHSA-g699-3x6g-wm3g MODERATE Egress Policy Bypass via DNS over TCP in Harden-Runner (Community Tier) GHSA 2.16.0
GHSA-cpmj-h4f6-r6pq MODERATE Harden-Runner: Bypassing Logging of Outbound Connections Using sendto, sendmsg, and sendmmsg in Harden-Runner (Community Tier) GHSA 2.14.2
GHSA-mxr3-8whj-j74r MODERATE Harden-Runner allows evasion of 'disable-sudo' policy GHSA 2.12.0
GHSA-g85v-wf27-67xc LOW Harden-Runner has a command injection weaknesses in setup.ts and arc-runner.ts GHSA 2.10.2
### Release Age (cooldown: 7 days)
Package Version Published Age Status
step-security/harden-runner v2.19.1 2026-05-02 9d ✅ passed

Project Health (OpenSSF Scorecard)

Action Score Details
step-security/harden-runner 8.1/10 View

Last scanned: 2026-05-12 06:37 UTC

@github-actions github-actions Bot merged commit d46b5a8 into main May 12, 2026
6 of 7 checks passed
@dependabot dependabot Bot deleted the dependabot/github_actions/step-security/harden-runner-2.19.1 branch May 12, 2026 06:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants