Skip to content

fix(ci): prevent script injection in conventional commits workflow#98

Merged
sugat009 merged 1 commit intomainfrom
fix/conventional-commits-security
Apr 30, 2026
Merged

fix(ci): prevent script injection in conventional commits workflow#98
sugat009 merged 1 commit intomainfrom
fix/conventional-commits-security

Conversation

@sugat009
Copy link
Copy Markdown
Member

Summary

  • Fix SonarCloud security blocker: PR title was interpolated directly in a run: block, enabling shell injection via crafted PR titles. Now passed through an env: variable instead.
  • Add --ignore-scripts to npm ci to prevent execution of arbitrary post-install scripts.
  • Update actions (checkout@v6, setup-node@v6) and Node (22.x) to match the rest of the CI.

Pass PR title through env variable instead of direct interpolation
to prevent shell injection attacks. Also update actions to v6,
Node to 22.x, and use npm ci --ignore-scripts.
@sonarqubecloud
Copy link
Copy Markdown

@sugat009 sugat009 requested a review from Hareet April 17, 2026 13:25
@sugat009 sugat009 self-assigned this Apr 17, 2026
@sugat009 sugat009 moved this from Todo to In Review in CHT Multi-Agent System (cht-agent) Apr 17, 2026
Copy link
Copy Markdown
Member

@Hareet Hareet left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@sugat009 sugat009 merged commit 3f74f87 into main Apr 30, 2026
3 checks passed
@sugat009 sugat009 deleted the fix/conventional-commits-security branch April 30, 2026 16:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Development

Successfully merging this pull request may close these issues.

2 participants