The 'version' input in the `action.yml` for TruffleHog GitHub Action currently defaults to "latest". The user requests that this default be changed to the action's release version, aligning with GitHub's security hardening recommendations.
## Problem The `version` input in `action.yml` defaults to `"latest"`: https://github.com/trufflesecurity/trufflehog/blob/main/action.yml ```yaml inputs: version: default: "latest" description: Scan with this trufflehog cli version. required: false ``` This means that when users pin the action to a specific commit SHA (as recommended by [GitHub's security hardening guide](https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-third-party-actions)), the Docker image pulled at runtime is still ghcr.io/trufflesecurity/trufflehog:latest — a mutable tag that can change at any time. For example, pinning to the v3.93.8 release SHA: `uses: trufflesecurity/trufflehog@6c05c4a00b91aa542267d8e32a8254774799d68d# v3.93.8` still results in the latest image being pulled, not v3.93.8. This is observable in the workflow logs. The action code is pinned, but the actual scanner binary running inside the container is not. This creates a two-layer su