github-actions-cicd

GitHub Actions CI/CD Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "github-actions-cicd" with this command: npx skills add hack23/homepage/hack23-homepage-github-actions-cicd

GitHub Actions CI/CD Skill

Purpose

Defines CI/CD pipeline best practices using GitHub Actions for automated testing, security scanning, and deployment.

Rules

Workflow Structure

MUST INCLUDE:

  • Code quality checks (linting, formatting)

  • Security scanning (CodeQL, Dependabot, ZAP)

  • Performance audits (Lighthouse)

  • Build and minification

  • Deployment (with approval for production)

Example Workflow:

name: CI/CD Pipeline

on: push: branches: [main] pull_request: branches: [main]

permissions: contents: read security-events: write

jobs: validate: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 - name: Validate HTML run: npm run validate:html - name: Lint CSS run: npm run lint:css

security-scan: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 - name: Initialize CodeQL uses: github/codeql-action/init@v3 - name: Perform CodeQL Analysis uses: github/codeql-action/analyze@v3 - name: ZAP Baseline Scan uses: zaproxy/action-baseline@v0.10.0 with: target: 'https://www.hack23.com'

lighthouse: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 - name: Run Lighthouse uses: treosh/lighthouse-ci-action@v10 with: urls: | https://www.hack23.com/ https://www.hack23.com/services.html budgetPath: ./budget.json uploadArtifacts: true

deploy: needs: [validate, security-scan, lighthouse] runs-on: ubuntu-latest if: github.ref == 'refs/heads/main' steps: - uses: actions/checkout@v4 - name: Configure AWS credentials uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.AWS_ROLE_ARN }} aws-region: us-east-1 - name: Sync to S3 run: aws s3 sync . s3://${{ secrets.S3_BUCKET }} --delete - name: Invalidate CloudFront run: aws cloudfront create-invalidation --distribution-id ${{ secrets.CF_DIST_ID }} --paths "/*"

Security Best Practices

MUST:

  • Use OIDC for AWS authentication (no long-lived keys)

  • Store secrets in GitHub Secrets

  • Use least-privilege IAM roles

  • Pin action versions with full commit SHA

  • Enable Dependabot for action updates

  • Use permissions key to minimize token scope

MUST NOT:

  • Commit secrets to repository

  • Use personal access tokens in workflows

  • Grant overly broad permissions

Related Documentation

  • aws-s3-cloudfront SKILL.md

  • secure-development SKILL.md

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

secure-code-review

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

secure-development

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

agentic-workflow-development

No summary provided by upstream source.

Repository SourceNeeds Review