A CI/CD security agent that monitors GitHub Actions runners for threats like network egress, file integrity, and process activity.
Harden-Runner is a CI/CD security agent that functions like an Endpoint Detection and Response (EDR) system for GitHub Actions runners. It monitors network egress, file integrity, and process activity on these runners in real-time to detect and prevent supply chain attacks. It addresses the security gap where CI/CD runners, which handle sensitive secrets and create production builds, often lack the robust monitoring found on other critical systems.
Development and security teams using GitHub Actions for CI/CD, particularly those managing open-source projects, enterprises with private repositories, or organizations with strict compliance requirements for their software supply chain.
Developers choose Harden-Runner because it provides CI/CD-aware security monitoring tailored for the ephemeral nature of runners, offering real-time threat detection, automated baselining, and actionable insights that traditional EDR tools lack. Its ability to correlate events directly to workflow steps and its support for both GitHub-hosted and self-hosted runners make it a unique, context-rich security solution.
Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. It monitors network egress, file integrity, and process activity on those runners, detecting threats in real-time.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Correlates security events directly to workflow steps and jobs, providing insights traditional EDR tools miss, as highlighted in case studies like the tj-actions/changed-files breach.
Builds a baseline from past outbound network activity and flags deviations, enabling proactive threat detection without manual configuration.
Supports audit and blocking modes on various runner types, including self-hosted and GitHub-hosted, with compatibility across Linux, Windows, and macOS.
Secures over 18 million weekly runs and has detected real-world supply chain attacks in high-profile projects, demonstrating its reliability.
On GitHub-hosted Windows and macOS runners, only audit mode is available, restricting network egress control and other advanced security features.
Critical features like process visibility, file write tracking, and private repo support require a paid subscription, which may hinder adoption for smaller teams.
Anomaly detection relies on historical data, so initial deployments need a ramp-up period to build an effective baseline, delaying full protection.