You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This sample project recommends devs to upload the entire node_modules directory. While using such a simple plugin the entire codebase including node_modules is then downloaded and used without any sort of checks.
What is stopping people from uploading malicious stuff inside such node_modules to steal source code or inject exploits while using such actions?
The text was updated successfully, but these errors were encountered:
Hi All, I submitted a PR to this repo to switch how this is currently handled. Instead of committing node_modules or including a npm install step before the action is run, this approach uses @vercel/ncc to package dependencies into a single JS file. This is the same approach used in the TypeScript and JavaScript action templates.
This sample project recommends devs to upload the entire
node_modules
directory. While using such a simple plugin the entire codebase includingnode_modules
is then downloaded and used without any sort of checks.What is stopping people from uploading malicious stuff inside such node_modules to steal source code or inject exploits while using such actions?
The text was updated successfully, but these errors were encountered: