Skip to content

Add supply chain security cooldowns for Dependabot and uv#4659

Open
strickvl wants to merge 7 commits intodevelopfrom
feat/supply-chain-cooldowns
Open

Add supply chain security cooldowns for Dependabot and uv#4659
strickvl wants to merge 7 commits intodevelopfrom
feat/supply-chain-cooldowns

Conversation

@strickvl
Copy link
Copy Markdown
Contributor

Summary

  • Adds a cooldown to Dependabot's GitHub Actions updates (7 days default, 14 days for major bumps, 3 days for patches). This means Dependabot will wait before proposing action version updates, giving the community time to detect and yank compromised versions. Security updates bypass the cooldown automatically.
  • Adds a 3-day exclude-newer window to uv via pyproject.toml, so Python package versions published in the last 3 days are skipped during dependency resolution. This blocks the most common supply chain attack pattern. Developers can override with --exclude-newer "0 days" when needed.

Context

Of the 10 supply chain attacks William Woodruff examined, 8 had windows of opportunity under a week. Even a short cooldown dramatically reduces exposure.

Related

Test plan

  • Verify Dependabot config is valid (GitHub will show an error on the Settings > Code security page if not)
  • Verify uv resolution still works: uv pip install -e ".[dev]" should succeed (all current deps are older than 3 days)
  • Verify override works: uv add some-pkg --exclude-newer "0 days" should bypass the cooldown

Adds a 7-day cooldown to Dependabot's GitHub Actions updates so that
recently-published (potentially compromised) action versions are ignored
until they've been available long enough to be vetted. Security updates
bypass the cooldown automatically.

Adds a 3-day exclude-newer window to uv so that Python package versions
published in the last 3 days are skipped during dependency resolution.
This blocks the most common supply chain attack pattern where a malicious
version is published and pulled by automated tooling before it gets yanked.

Related: #4658 (permissions audit follow-up)
@strickvl strickvl added internal To filter out internal PRs and issues no-release-notes Release notes will NOT be attached and used publicly for this PR. labels Mar 31, 2026
@CLAassistant
Copy link
Copy Markdown

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.


Alex Strick van Linschoten seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account.
You have signed the CLA already but the status is still pending? Let us recheck it.

@strickvl strickvl requested a review from stefannica March 31, 2026 06:32
@strickvl strickvl added the security Related to security label Mar 31, 2026
@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Mar 31, 2026

Documentation Link Check Results

Absolute links check passed
Relative links check passed
Last checked: 2026-04-01 13:54:13 UTC

Alex Strick van Linschoten added 2 commits April 1, 2026 13:14
Resolve conflict in dependabot.yml: keep both the update-types
filter from develop and the cooldown settings from this branch.
The github-actions ecosystem doesn't support semver-based cooldown
(semver-major-days, semver-minor-days, semver-patch-days). Keep only
default-days which is supported across all ecosystems.
@strickvl strickvl added the run-slow-ci Tag that is used to trigger the slow-ci label Apr 1, 2026
@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 1, 2026

LLM Finetuning template updates in examples/llm_finetuning have been pushed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

internal To filter out internal PRs and issues no-release-notes Release notes will NOT be attached and used publicly for this PR. run-slow-ci Tag that is used to trigger the slow-ci security Related to security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants