Disable Greptile SHA pinning rule#2076
Conversation
Greptile SummaryThis PR splits a single bundled Greptile
|
| Filename | Overview |
|---|---|
| .greptile/config.json | Splits the compound github-actions-security rule into 5 discrete rules and disables only the SHA-pinning check via "enabled": false, which is a supported field in the Greptile config schema. |
Flowchart
%%{init: {'theme': 'neutral'}}%%
flowchart TD
A[PR touches .github/workflows/**] --> B{Rule check}
B --> C[github-actions-pin-third-party-actions\n❌ DISABLED]
B --> D[github-actions-permissions\n✅ enabled]
B --> E[github-actions-no-secret-echo\n✅ enabled]
B --> F[github-actions-no-pr-target-checkout\n✅ enabled]
B --> G[github-actions-secret-exfiltration-review\n✅ enabled]
style C fill:#f5f5f5,stroke:#aaa,color:#999
style D fill:#e6f4ea,stroke:#34a853
style E fill:#e6f4ea,stroke:#34a853
style F fill:#e6f4ea,stroke:#34a853
style G fill:#e6f4ea,stroke:#34a853
Reviews (2): Last reviewed commit: "Merge branch 'main' into codex/disable-g..." | Re-trigger Greptile
Summary
github-actions-securityrule into separate GitHub Actions security checks.enabled: false.pull_request_target, and secret exfiltration review rules enabled.Why
Greptile was flagging workflow actions that are pinned to version tags even though the repo does not consistently enforce full-SHA pinning today. Splitting the compound rule lets us disable that sentence locally while preserving the other workflow security checks.
Validation
jq empty .greptile/config.jsongit diff --check -- .greptile/config.json