Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Exposes sensitive variables in logs #75

Closed
peter-dolkens opened this issue Apr 23, 2021 · 4 comments
Closed

Exposes sensitive variables in logs #75

peter-dolkens opened this issue Apr 23, 2021 · 4 comments

Comments

@peter-dolkens
Copy link

I can't use this for our company, as it dumps potentially sensitive private keys straight to the logs.

Unfortunately, it not only exposes them, but also reformats them, meaning the inbuilt github secret masking doesn't catch it.

@mpdude
Copy link
Member

mpdude commented Apr 23, 2021

😱 do you have an example or can you point us to the line where this is logged/printed?

@peter-dolkens
Copy link
Author

I'll try replicate again tomorrow - was a message about the key not being recognized as a GitHub deployment key.

I wanted to purge that log asap when it came through 🤣

@mpdude
Copy link
Member

mpdude commented Apr 24, 2021

Sure it was a private key? A public key fingerprint would make more sense to me.

@mpdude
Copy link
Member

mpdude commented Apr 28, 2021

@peter-dolkens this action passes the sensitive, private keys directly into ssh-add. Everything later on, including the output shown and comment parsing, is done based on ssh-add -l or ssh-add -L output. So, it should be public key fingerprints or public key parameters only.

I'll close this for now, but feel free to reopen if you still suspect something being wrong here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants