list_imposter_commit_detections
Detect GitHub Actions pinned to commit SHAs that do not match any legitimate tag or branch of that action's repo, a strong indicator of action-tampering. Results include dashboard URLs for each detection.
Instructions
List detections where a GitHub Action is pinned to a commit SHA that doesn't match any legitimate tag or branch head of that action's repo — a strong indicator of Action-tampering (e.g. a compromised tag pointing to malicious commit). Every result has a dashboard_url — when you present detections to the user you MUST include a clickable link per detection, not just the first one.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| customer | No | StepSecurity customer/tenant identifier. Optional — if omitted, falls back to STEP_SECURITY_CUSTOMER env var. Returns detections aggregated across ALL GitHub orgs installed under this tenant. | |
| status | No | Detection status filter. Defaults to 'new'. | |
| limit | No | Max detections to return (1-200). Defaults to 50. | |
| orgScope | No | Optional: restrict to a single GitHub org under this tenant (uses the owner-scoped endpoint instead of tenant-wide). |