# Detections

{% hint style="warning" %}
Available for **Enterprise** Tier only
{% endhint %}

Harden-Runner can monitor outbound runtime detections to help you stay informed about security risks in your GitHub Actions workflows. You can review all past runtime detections on the **Detections** page under the **Harden-Runner** menu.

{% hint style="info" %}
Harden-Runner detects compromised npm packages at runtime. For PR-level prevention, see [NPM Supply Chain Security → Prevent](https://app.gitbook.com/s/nWcOGIMQQsclkjX6nz4Z/prevent)
{% endhint %}

## Types of Detections

The **Detections** page covers **ten** critical areas:

1. Secrets in Build Logs
2. Secrets in Artifacts
3. Outbound Calls Blocked
4. Anomalous Outbound Network Calls
5. Suspicious Outbound Network Calls
6. Source Code Overwritten
7. HTTPS Outbound Network Calls
8. Action Uses Imposter Commit
9. Suspicious Process Events
10. Agent Tampered

Each detection is linked to the relevant GitHub Actions workflow and run and includes direct links to the run and the insights URL that indicates where the detection happened.&#x20;

### **Secrets in Build Logs**

This section shows secrets (API keys, tokens, etc.) that were accidentally logged.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FZARvnd8fRBLP1hAUo0dc%2FScreenshot%202025-09-28%20at%2007.20.31.png?alt=media&#x26;token=418a31f1-7244-4db5-be1e-218a1d9eb688" alt=""><figcaption></figcaption></figure>

### **Secrets in Artifacts**

&#x20;Detects secrets found in generated artifacts

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FWmVCIwbOj5ezgzPsPjpZ%2FScreenshot%202025-09-28%20at%2007.20.42.png?alt=media&#x26;token=de63a576-a079-4d38-b832-8f6c8d7bbbb9" alt=""><figcaption></figcaption></figure>

### **Outbound Calls Blocked**

Shows network requests that were blocked to prevent security risks.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FOhNpX66qNEHGOMF6WRhD%2FScreenshot%202025-09-28%20at%2007.20.50.png?alt=media&#x26;token=ced2ecfd-9ad1-48bf-8b7a-2f9eaee6ac4c" alt=""><figcaption></figcaption></figure>

### **Anomalous Outbound Network Calls**

Lists unusual or unexpected external network requests.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FPWDl0iipEzuhcKga1hWb%2FScreenshot%202025-09-28%20at%2007.21.02.png?alt=media&#x26;token=1d467321-31b8-48cd-bfaa-9ea5f3352453" alt=""><figcaption></figcaption></figure>

### **Suspicious Outbound Network Calls**

Detects potentially malicious network requests during workflow execution

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FVrwFjsjVjUmhEtwVjzdr%2FScreenshot%202025-09-28%20at%2007.25.14.png?alt=media&#x26;token=710c8c82-1de7-41af-b626-6a47b057c821" alt=""><figcaption></figcaption></figure>

### **HTTPS Outbound Network Calls**

Lists network requests made over HTTPS to prevent security risks.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FRwlMR2ym2t1ZiqmSdl1N%2FScreenshot%202025-09-28%20at%2007.25.29.png?alt=media&#x26;token=5a9c35fa-1cae-493d-b15e-f975338c029c" alt=""><figcaption></figcaption></figure>

### **Source Code Overwritten**

Tracks files modified during workflows to detect unauthorized changes.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FNWrW0f3kXzZ0afeddhhT%2FScreenshot%202025-09-28%20at%2007.25.32.png?alt=media&#x26;token=3605d845-7682-4c57-bd34-774be3a9ccbe" alt=""><figcaption></figcaption></figure>

### **Action Uses Imposter Commit**

List actions that use imposter commits

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FDPFzBvHecsiMyaMlOdkV%2FScreenshot%202025-09-28%20at%2007.25.46.png?alt=media&#x26;token=d3fe267f-3b77-4ac3-8beb-117122872fda" alt=""><figcaption></figcaption></figure>

### **Suspicious Process Events**

Lists process events that are flagged as suspicious.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FRZeTjqXlz0HhsFSpGPo2%2FScreenshot%202025-09-28%20at%2007.27.17.png?alt=media&#x26;token=3cee9c65-af08-48e9-abf6-614a2380ccee" alt=""><figcaption></figcaption></figure>

### **Agent Tampered**

Detects when the Harden-Runner agent has been tampered with during workflow execution.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FpeBMh5GyRaZLDFOZvACt%2FScreenshot%202026-01-15%20at%2022.42.28.png?alt=media&#x26;token=5f5ecf62-c460-418c-9dba-c43cdc020ed7" alt=""><figcaption></figcaption></figure>

## **How to Suppress a Detection**

Suppressing a detection hides it from your active list without marking it as fixed. Use suppression when the detection is a false positive, not relevant, or represents an acceptable risk. Suppressed detections remain available under the “Suppressed” tab for future review, and can be unsuppressed if needed

**Step 1:** Click the three dots next to the item you want to suppress, then select “Suppress Detection.”

![](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-09-28/32f8a06f-4c9e-42b3-ba5b-0682c6f3cd92/ascreenshot.jpeg?tl_px=272,36\&br_px=3024,1575\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=990,277)

**Step 2:** Select a reason for suppressing the detection.

![](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-09-28/466fe23f-a442-4a61-ab86-f024c8f7a04f/ascreenshot.jpeg?tl_px=0,0\&br_px=2752,1538\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=411,223)

**Step 3:** Click "Suppress"

![](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-09-28/1ff4f313-6454-46d0-aafb-fbba803fb65b/ascreenshot.jpeg?tl_px=272,183\&br_px=3024,1722\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=647,416)

**Step 4:** Go to the “Suppressed” tab to view all suppressed detections

![](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-09-28/171443e1-a78e-4aab-8876-627e98c40fc0/ascreenshot.jpeg?tl_px=272,158\&br_px=3024,1697\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=563,276)

## **How to Resolve a Detection**

Resolving a detection indicates that you have addressed the underlying issue. Use this option after taking corrective action, such as updating a workflow, fixing a configuration, or applying a patch. Resolved detections move out of the active list but remain in the system for audit and traceability.

**Step 1:** Click the three dots next to the item you want to resolve, then select “Resolve Detection.”

![](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-09-28/485b22e7-d530-457d-9e16-5231ddbae91b/ascreenshot.jpeg?tl_px=272,0\&br_px=3024,1538\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=1026,262)

**Step 2:** Give a reason for resolving the detection.

![](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-09-28/afa345e8-7d78-4296-8952-216b8b483bee/ascreenshot.jpeg?tl_px=0,31\&br_px=3024,1721\&force_format=jpeg\&q=100\&width=1120.0)

**Step 3:** Click "Resolve"

![](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-09-28/5bcedbc0-fbfd-4c90-8eeb-b5587a33b466/ascreenshot.jpeg?tl_px=272,183\&br_px=3024,1722\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=661,327)

**Step 4:** Go to the “Resolved” tab to view all resolved detections

![](https://ajeuwbhvhr.cloudimg.io/https://colony-recorder.s3.amazonaws.com/files/2025-09-28/38711e43-a49f-407d-a292-5f4e6ddebb15/ascreenshot.jpeg?tl_px=272,180\&br_px=3024,1719\&force_format=jpeg\&q=100\&width=1120.0\&wat=1\&wat_opacity=1\&wat_gravity=northwest\&wat_url=https://colony-recorder.s3.amazonaws.com/images/watermarks/8B5CF6_standard.png\&wat_pad=825,276)

## **Real-Time Security Alerts**

StepSecurity delivers real-time alerts for runtime detections, ensuring you stay informed about potential security threats as they happen.

To minimize alert fatigue, notifications are sent only once per event, covering all repositories in your GitHub organization. This approach maintains visibility into security events without overwhelming your team.

Follow the instructions in [Notification Settings](https://docs.stepsecurity.io/settings/notifications) to configure your alerts.
