April 24, 2026
Detect AI-generated pull requests
Version updated for https://github.com/sargunv/ai-pr-detector to version v0.1.0.
This action is used across all versions by 2 repositories. Action Type This is a Node action using Node version 24.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The AI PR Detector GitHub Action automates the detection of AI-generated contributions in pull requests by scanning commit metadata for known AI bot committer emails and commit message patterns. It helps maintainers identify and optionally label pull requests with AI-generated content, streamlining the review process and improving transparency. Additionally, it provides an output flag indicating whether AI signals were detected, enabling further automation or decision-making workflows.
April 24, 2026
AgentAuditKit MCP Security Scan
Version updated for https://github.com/sattyamjjain/agent-audit-kit to version v0.3.4.
This action is used across all versions by ? repositories. Action Type This is a Docker action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary AgentAuditKit is a security scanner designed for AI agent pipelines that identifies vulnerabilities such as misconfigurations, hardcoded secrets, tool poisoning, and tainted data flows across 13 agent platforms. It automates compliance checks, taint analysis, and supply chain security, providing extensive rule-based scanning and OWASP-aligned coverage for proactive risk mitigation. The action enables offline use, generates detailed compliance reports, and ensures rapid updates for addressing newly disclosed CVEs.
April 24, 2026
sbomify
Version updated for https://github.com/sbomify/sbomify-action to version v26.2.0.
This action is used across all versions by 26 repositories. Action Type This is a Docker action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The sbomify-action GitHub Action automates the generation, enrichment, and management of Software Bill of Materials (SBOMs) within CI/CD pipelines. It supports multiple SBOM formats (CycloneDX, SPDX) and sources (e.g., lockfiles, Docker images), while also enhancing SBOMs with metadata such as licenses, authors, and dependencies. By enabling cryptographic signing, attestation, and integration with tools like sbomify, the action helps ensure a secure and verifiable software supply chain.
April 24, 2026
compose-lint
Version updated for https://github.com/tmatens/compose-lint to version v0.5.1.
This action is used across all versions by 0 repositories. Action Type This is a Composite action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The compose-lint GitHub Action is a security-focused linter for Docker Compose files that identifies and prevents potentially dangerous misconfigurations before deployment. It automates the process of validating Compose files against best practices and security standards, such as OWASP and CIS benchmarks, providing a fast, opinionated, and zero-configuration way to ensure secure container configurations. Its key features include support for auto-detection of Compose files, thorough security checks, and integration with tools like Docker Scout, Trivy, and Grype for vulnerability scanning.
April 24, 2026
Regis Security Analysis
Version updated for https://github.com/trivoallan/regis to version v0.30.0.
This action is used across all versions by 1 repositories. Action Type This is a Composite action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary Regis is a GitHub Action designed to automate container security assessments and policy compliance in CI/CD pipelines. It provides comprehensive container analysis by orchestrating tools like Trivy and Hadolint, supports customizable Policy-as-Code playbooks for enforcing security and compliance rules, and generates both machine-readable and interactive reports for actionable insights. By integrating seamlessly into CI/CD workflows, Regis streamlines vulnerability scanning, compliance checks, and supply chain integrity, enhancing container security and operational efficiency.
April 24, 2026
Gemini AI PR Reviewer
Version updated for https://github.com/Val-d-emar/gemini-review to version v1.2.1.
This action is used across all versions by ? repositories. Action Type This is a Composite action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The Gemini AI PR Reviewer Action is a GitHub Action that automates code reviews for pull requests using Google’s Gemini AI models. It identifies and analyzes only the changed lines in a PR, providing intelligent feedback, approval, or requested changes based on AI evaluation. This action simplifies and accelerates the code review process by integrating seamlessly with GitHub workflows and supporting both free and enterprise-level Google AI authentication methods.
April 24, 2026
CargoWall eBPF Firewall
Version updated for https://github.com/code-cargo/cargowall-action to version v1.1.1.
This action is used across all versions by 2 repositories. Action Type This is a Node action using Node version 24.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The CargoWall GitHub Action is an eBPF-based network firewall designed to secure GitHub Actions workflows by monitoring and controlling outbound connections during CI/CD runs. It automates tasks like hostname and IP filtering, DNS tunneling prevention, and Docker integration to prevent supply chain attacks, block unauthorized data exfiltration, and enforce network egress rules at the kernel level. Key capabilities include high-performance filtering, customizable allow/deny lists, and optional API integration for enhanced auditing and control.
April 24, 2026
Setup aimock
Version updated for https://github.com/CopilotKit/aimock to version v1.15.1.
This action is used across all versions by 35 repositories. Action Type This is a Composite action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The aimock GitHub Action provides a comprehensive mock infrastructure for testing AI applications by simulating interactions with various APIs and services, including LLMs, multimedia tools, vector databases, and agent protocols. It automates the process of creating controlled testing environments, preventing unexpected API costs and enabling deterministic replay of API responses. Key capabilities include support for multiple AI providers, multi-turn conversation replay, multimedia API emulation, and seamless integration of diverse mock services on a single port.
April 24, 2026
dbt Cloud Job action
Version updated for https://github.com/dbt-labs/dbt-cloud-job-action to version v7.1.0.
This publisher is shown as ‘verified’ by GitHub.
This action is used across all versions by ? repositories.
Action Type This is a Node action using Node version 20.
Go to the GitHub Marketplace to find the latest changes.
Action Summary This GitHub Action facilitates the automation of triggering and managing dbt Cloud jobs directly from a GitHub workflow. It allows users to initiate dbt Cloud jobs, monitor their progress, and retrieve key artifacts such as run_results.json, manifest.json, and catalog.json. Additionally, it provides enhanced functionality like job cancellation upon action termination, support for GitHub pull request integration, and configurable options for overriding job parameters and execution steps.
April 24, 2026
Install Determinate Nix
Version updated for https://github.com/DeterminateSystems/determinate-nix-action to version v3.18.0.
This publisher is shown as ‘verified’ by GitHub.
This action is used across all versions by 738 repositories.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The Determinate Nix Action is a GitHub Action designed to streamline the installation and management of the Nix package manager in CI/CD workflows across various platforms, including macOS, Linux, WSL2, and containers. It automates the setup of a consistent and reproducible Nix environment, solving challenges around version control, platform compatibility, and dependency management. Key capabilities include platform-specific optimization, version pinning for reproducibility, and seamless integration with GitHub-hosted or self-hosted runners.