-
Notifications
You must be signed in to change notification settings - Fork 496
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New check: Check for dangerous code practices in github workflows #426
Comments
Dangerous permissions |
Thinking of broadening this check to "Dangerous workflow coding patterns":
I've left out We could also make this check the "workflow hardening check": use the above plus token permission check. |
Hi, the important prerequisite for the dangerous pattern of |
Thanks for the information, that's super useful. If someone in your team is interested in taking a stab at this, please let me know. |
Added a few more bad things to the list after reading https://securitylab.github.com/research/github-actions-preventing-pwn-requests/ |
Can I try this one? One thing I can't figure out is if it should be merged into Token Permissions and that be renamed, or totally separate like "Workflow Patterns" |
You sure can! I think we can start it as a different check first. We can merge them later. I've assigned to you. Thanks you! |
Let's try to do 5 and 8. They are fairly simple. Adding to v5 milestone. wdut? We can try to share the workload if needed. |
On it for 8! |
Second order command injection attacks are also possible if attacker controlled input is passed from a workflow to a vulnerable action. For example:
|
That's an amazing find. Thanks @calebbrown for letting us know! |
I'll take a stab at 5. |
Closing as |
Re-opening because there's a list of things we have not implemented. I don't mind closing this issue of we created dedicated issues for the remaining ones |
Maybe 9 is the only one to create an issue for? |
There are several examples of github token leaks via
pull_request_target
event. It'd be nice to check for it - possibly filtering out known acceptable github actions that use it after we have reviewed their code (and it's pinned by hash). This check goes in the same direction as #414, ie harden github worflows.The text was updated successfully, but these errors were encountered: