Skip to content

CodeQL queries for actions#254

Merged
xcorail merged 3 commits intogithub:mainfrom
JarLob:patchy
Jan 28, 2021
Merged

CodeQL queries for actions#254
xcorail merged 3 commits intogithub:mainfrom
JarLob:patchy

Conversation

@JarLob
Copy link
Copy Markdown
Contributor

@JarLob JarLob commented Jan 28, 2021

No description provided.

@JarLob JarLob requested a review from xcorail January 28, 2021 21:04
@xcorail xcorail merged commit c637fd4 into github:main Jan 28, 2021
* @description Workflows triggered on `pull_request_target` have read/write tokens for the base repository and the access to secrets.
* By explicitly checking out and running the build script from a fork the untrusted code is running in an environment
* that is able to push to the base repository and to access secrets.
* @id java/actions/pull_request_target
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why has this (and the other) query the id java/foo?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch. A proper pull request will be created shortly, this is just for the blog post.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants