Skip to content
Discussion options

You must be logged in to vote

Concerns 1 and 2 are valid. Concerns 3 and 4 are not an issue on GitHub-hosted runners.

GitHub-hosted runners are ephemeral. Each job runs in a clean environment and is destroyed afterward, so any Docker login session is automatically removed. Not logging out does not create a realistic risk of credential reuse or spoofing.

This only becomes a real concern with self-hosted runners, where the environment persists and credentials could remain on disk. In that case, logout and cleanup are required.

Bottom line: no practical security risk here in the default GitHub setup.

Replies: 2 comments 2 replies

Comment options

You must be logged in to vote
1 reply
@Kelso-stryd
Comment options

Answer selected by Kelso-stryd
Comment options

You must be logged in to vote
1 reply
@Kelso-stryd
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Code Security Build security into your GitHub workflow with features to keep your codebase secure Question Ask and answer questions about GitHub features and usage Welcome 🎉 Used to greet and highlight first-time discussion participants. Welcome to the community!
3 participants