🔍 Static Analysis Report - December 2, 2025 #5280
Closed
Replies: 2 comments 1 reply
-
|
/plan |
Beta Was this translation helpful? Give feedback.
1 reply
-
|
This discussion was automatically closed because it was created by an agentic workflow more than 3 days ago. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
Comprehensive static analysis scan completed on 92 agentic workflows using three security and code quality tools:
Key Findings: 13 total issues identified across 8 workflows (91% of workflows are clean)
Analysis Summary
Findings by Tool
Workflows Status
Clustered Findings by Tool and Type
Zizmor Security Findings
1. Template Injection (Informational-Low) - 5 occurrences
Description: Code injection via template expansion in GitHub expressions
Affected Workflows:
breaking-change-checker.md- Line 5781:9 (Informational)changeset.md- Line 6254:9 (Informational)duplicate-code-detector.md- Line 5668:9 (Informational)mcp-inspector.md- Line 1784:9 (Low)release.md- Line 461:9 (Informational)Risk: Template injection allows attackers to potentially inject malicious code through GitHub expressions. While marked as Informational/Low severity, these should be reviewed to ensure proper input sanitization.
Reference: (redacted)#template-injection
2. Artipacked (Medium) - 1 occurrence⚠️
Description: Credential persistence through GitHub Actions artifacts
Affected Workflows:
release.md- Line 5876:9Risk: Credentials may be persisted in workflow artifacts, potentially exposing sensitive data to unauthorized users who can access the artifacts.
Reference: (redacted)#artipacked
Priority: HIGH - This is the only Medium severity security finding and should be addressed promptly.
Poutine Supply Chain Findings
No supply chain security issues detected ✅
All workflows passed poutine's supply chain security checks.
Actionlint Linting Issues
1. Syntax Check Errors - 1 occurrence
Issue Type: Invalid YAML syntax
Affected Workflow:
cloclo.md2. Expression Errors - 1 occurrence
Issue Type: Undefined property reference
Affected Workflow:
close-old-discussions.mdgithub.aw.inputs.count)3. Shellcheck Warnings (SC2086) - 5 occurrences
Issue Type: Missing quotes in variable expansions
Affected Workflows:
go-pattern-detector.md- Line 4425:9 (1 occurrence)release.md- Lines 464:9 (3 occurrences), 5887:9 (1 occurrence)Description: Variables without quotes can cause unexpected behavior with spaces or special characters (word splitting and glob expansion)
Impact: May cause runtime failures when variables contain spaces or special characters
Priority Rankings
Based on severity, impact, and number of occurrences:
🔴 Priority 1: Artipacked (Medium Severity)
🟠 Priority 2: Syntax/Expression Errors
🟡 Priority 3: Shellcheck Quoting
🔵 Priority 4: Template Injection
Fix Suggestions
Fix 1: Actionlint Syntax Errors (Priority 2)
Two workflows have blocking syntax errors that prevent execution:
Problem 1 - cloclo.md: Invalid
nameskey in issues triggerProblem 2 - close-old-discussions.md: Undefined property
github.aw.inputs.countFix 2: Shellcheck Variable Quoting (Priority 3)
Add quotes around all variable expansions in shell scripts:
Pattern:
Affected locations:
go-pattern-detector.md: Line 4425 in "Install ast-grep" steprelease.md: Lines 464 (3x) in "Setup environment and fetch release data" steprelease.md: Line 5887 in "Get release ID" stepDetailed Findings by Workflow
Breaking Change Checker
zizmor findings:
Changeset
zizmor findings:
Cloclo
actionlint findings:
Close Old Discussions
actionlint findings:
${{ github.aw.inputs.count }}Duplicate Code Detector
zizmor findings:
Go Pattern Detector
actionlint findings:
MCP Inspector
zizmor findings:
Release
zizmor findings:
artipacked (Medium) at line 5876:9
template-injection (Informational) at line 461:9
actionlint findings:
shellcheck SC2086 (error) at line 464:9 - occurrence 1
shellcheck SC2086 (error) at line 464:9 - occurrence 2
shellcheck SC2086 (error) at line 464:9 - occurrence 3
shellcheck SC2086 (error) at line 5887:9
Recommendations
Immediate Actions (This Week)
Fix blocking errors in cloclo.md and close-old-discussions.md
Address Medium severity security issue in release.md
Short-term Actions (Next Sprint)
Fix shellcheck warnings in go-pattern-detector.md and release.md
Review template injection warnings
Long-term Improvements
Integrate static analysis into CI/CD
Update workflow creation guidelines
Historical Context
Previous Scan: No previous scan data available
Trend: This is the baseline scan for future comparisons
Scan Metadata
Next Steps
Analysis performed by: Static Analysis Report Agent
Data stored in:
/tmp/gh-aw/cache-memory/Beta Was this translation helpful? Give feedback.
All reactions