-
Notifications
You must be signed in to change notification settings - Fork 154
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: checking for Untrusted input #19
Labels
enhancement
New feature or request
Comments
Thank you for your suggestion. It makes sense to me and looks nice to have. Let me consider this on next minor version up. |
I've implemented this on untrusted-input branch. Remaining task is adding tests and documents. This feature is being included in next minor version up v1.6.0. |
This feature was released at v1.6.0. |
Thanks! Awesome! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Keeping your GitHub Actions and workflows secure: Untrusted input | GitHub Security Lab describe the Untrusted input on GitHub Actions.
In many case, using next values in
run:
orscript:
directry has vulnerbility.For example, following action has a comand injection vulnerbility.
If attacker create malcious PR title like
";cat .git/config|base64"
, GitHub Actions will execulte the title as command.📝
actions/checkout
setGITHUB_TOKEN
in.git/config
for checkouting repo.We can mitigate the vulnerbility of action by usging
env:
as parameter.If actionlint check the Untrusted input in
run:
, it make us safer.Related
GitHub CodeQL has implemented related functions.
The text was updated successfully, but these errors were encountered: