Skip to content

fix: prevent shell injection in sync-xcodebuildmcp-docs workflow#6

Merged
cameroncooke merged 1 commit intomainfrom
fix/eng-7519-prevent-shell-injection
Apr 26, 2026
Merged

fix: prevent shell injection in sync-xcodebuildmcp-docs workflow#6
cameroncooke merged 1 commit intomainfrom
fix/eng-7519-prevent-shell-injection

Conversation

@fix-it-felix-sentry
Copy link
Copy Markdown
Contributor

Summary

This PR fixes a high-severity security finding by preventing potential shell injection in the sync-xcodebuildmcp-docs.yml GitHub Actions workflow.

Changes

Instead of directly interpolating ${{ inputs.ref }} in the shell command, the value is now stored in an environment variable INPUT_REF and referenced as "$INPUT_REF" in the script. This follows GitHub's security best practices for hardening GitHub Actions.

References

Use environment variable instead of direct interpolation of inputs.ref
to prevent potential shell injection attacks.

Fixes: https://linear.app/getsentry/issue/ENG-7519
Related: https://linear.app/getsentry/issue/VULN-1565

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@linear-code
Copy link
Copy Markdown

linear-code Bot commented Apr 26, 2026

@vercel
Copy link
Copy Markdown
Contributor

vercel Bot commented Apr 26, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
xcodebuildmcp-com Ready Ready Preview, Comment Apr 26, 2026 4:58am

Request Review

@cameroncooke cameroncooke merged commit 715f803 into main Apr 26, 2026
11 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant