How many of you used AI
to write code this week?
Keep your hand up if you reviewed it as carefully as code you wrote yourself.
Not because researchers got better at finding bugs. The attack surface is expanding faster than the defenses.
A single GitHub Action thousands of CI pipelines already trusted. The attacker didn't need your repo — just the tag you were already pulling at runtime.
Your security tool became the attack vector.
A JavaScript HTTP library running in 80% of cloud and code environments.
North Korean threat actor compromised a maintainer's npm account. Malicious versions lived for hours — long enough at 100M weekly downloads. Payload: a backdoor called Waveshaper.v2 across Windows, Linux, and Mac.
Rotating your credentials triggers the bomb.
You're not just
responsible for the code
you write.
You're responsible for the code
you trust.
Not the moment of review. Not the moment of CI. The moment the code is typed.
Mutable tags are the root cause of tj-actions. The roadmap locks every action — direct & transitive — like a go.sum for CI, plus runner-level egress firewall and org-wide execution policies.
Free for open source. On GHAS for private repos.
Secret scanning is GA via the GitHub MCP Server. Dependency scanning is in public preview. Your agent scans while you type — not in CI, after the fact.
CodeQL flags a vulnerability. Autofix shows you the fix inline. PR suggestion you accept, edit, or reject.
Filter CodeQL alerts by what's actually running and reachable.