No Dangerous Trigger Checkout
github-actions.no-dangerous-trigger-checkout
Flags pull_request_target workflows that check out PR head code. This runs attacker-supplied code with base-branch secrets and write permissions — the pattern behind the tj-actions/changed-files breach (CVE-2025-30066).
Compatible Integrations
This guardrail works with the following integrations. Click to see how to use No Dangerous Trigger Checkout with each collector.
Enable This Guardrail
Add the parent policy to your lunar-config.yml to enable this guardrail.
policies:
- uses: github://earthly/lunar-lib/policies/github-actions@v1.0.5
include: [no-dangerous-trigger-checkout]
# with: ...
How This Guardrail Works
This guardrail is part of the GitHub Actions Security Guardrails policy. It evaluates data collected by integrations and produces a pass/fail check with actionable feedback.
When enabled, this check runs automatically on every PR and in AI coding workflows, providing real-time enforcement of your engineering standards.
Learn How Lunar Works →GitHub Actions Security Guardrails
This guardrail is part of the GitHub Actions Security Guardrails policy, which includes 6 guardrails for security and compliance.
Ready to Automate Your Standards?
See how Lunar can turn your AGENTS.md, engineering wiki, compliance docs, or postmortem action items into automated guardrails with our 100+ built-in guardrails.