Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Absolute joke from a security perspective #5

Closed
prabhu opened this issue Jan 6, 2020 · 2 comments · Fixed by #51
Closed

Absolute joke from a security perspective #5

prabhu opened this issue Jan 6, 2020 · 2 comments · Fixed by #51
Assignees

Comments

@prabhu
Copy link

prabhu commented Jan 6, 2020

This sample project recommends devs to upload the entire node_modules directory. While using such a simple plugin the entire codebase including node_modules is then downloaded and used without any sort of checks.

What is stopping people from uploading malicious stuff inside such node_modules to steal source code or inject exploits while using such actions?

@rzr
Copy link

rzr commented Mar 5, 2020

Can't npm install be used at run time ?

Relate-to: https://help.github.com/en/actions/building-actions/creating-a-javascript-action

Update:
https://twitter.com/peckjon/status/1235984727464525824?s=20

@ncalteen
Copy link
Collaborator

Hi All, I submitted a PR to this repo to switch how this is currently handled. Instead of committing node_modules or including a npm install step before the action is run, this approach uses @vercel/ncc to package dependencies into a single JS file. This is the same approach used in the TypeScript and JavaScript action templates.

@ncalteen ncalteen self-assigned this Nov 7, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants