-
Notifications
You must be signed in to change notification settings - Fork 8
fix: avoid potential code injection #177
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
gurgunday
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
RafaelGSS
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
IIRC the matrix.node-version isn't a untrusted input as we have the versions fixed in the workflow.
Anyway, LGTM
That was just to stop the codeql false positives constantly popping up. 😬 |
Uzlopak
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
mcollina
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
This was covered in the GitHub Secure Open Source Fund program that Fastify participated in.
See https://securitylab.github.com/resources/github-actions-untrusted-input/ for supporting documentation.
Checklist
and the Code of conduct