CI/CD that"s secure by default.

IronCD is a drop-in replacement for GitHub Actions that provides strict, policy-based egress controls for your builds to stop secret exfiltration and supply chain attacks before they can cause damage.

Today, CI is vulnerable.

Blind outbound access

Builds can hit any host on the Internet by default. Perfect for secret exfil.

Repo write = full execution

One commit grants full execution inside your infra. No guardrails.

Malicious dependencies work silently

Package updates can pull compromised code that phones home instantly.

No audit trail

You have no idea which endpoints builds talk to, or what data leaves.

IronCD makes CI secure.

Lock down your CI in three steps, without rewriting your pipelines.

1

Write a Network Policy

Describe exactly which endpoints your builds can talk to in a simple YAML policy. Start broad, then tighten.

  • Allow only the endpoints you trust
  • Block everything else by default
  • Includes presets for popular services
.ironcd/policy.yaml
mode: enforce
allow:
- preset: npm
- preset: ruby
- host: "registry.ironcd.com"
2

Point your CI at IronCD

Switch your GitHub Actions runners to IronCD. Your jobs stay the same. Every run now goes through your egress policy.

  • Minimal workflow file changes
  • Same triggers, steps, and secrets
  • Policy enforced at the network layer
.github/workflows/ci.yaml
jobs:
test-go:
-runs-on: [ubuntu-latest]
+runs-on: [ironcd-4cpu-ubuntu-2404]
steps:
- name: Run Go tests
run: go test -v ./...
3

Monitor and Tighten

Use the dashboard to see which builds tried to call out, which destinations were blocked, and where your policy should lock down further.

  • Per-run view of allowed and blocked connections
  • Detect unexpected egress
  • Iterate until there are no exfil paths left
Egress Report
registry-1.docker.io19Allowed
esm.ubuntu.com16Denied
telemetry.s3.ama...3Denied

Who IronCD Is For

If this sounds like you, IronCD is a fit.

Secret exfiltration from CI would be catastrophic.

You’re concerned about supply-chain attacks in dependencies.

You’re in a regulated industry with egress control requirements.

You need full auditability of CI network traffic.

You want GitHub Actions with hardened, locked-down runners.

Join the private beta.

We are onboarding a small number of teams. Tell us about your stack and threat model, and we'll be in touch.