Skip to content

[Security] Fix HIGH vulnerability: yaml.github-actions.security.run-shell-injection.run-shell-injection#925

Open
orbisai0security wants to merge 1 commit intoyaml:mainfrom
orbisai0security:fix-shell-injection-dynamatrix-action
Open

[Security] Fix HIGH vulnerability: yaml.github-actions.security.run-shell-injection.run-shell-injection#925
orbisai0security wants to merge 1 commit intoyaml:mainfrom
orbisai0security:fix-shell-injection-dynamatrix-action

Conversation

@orbisai0security
Copy link
Copy Markdown

Security Fix

This PR addresses a HIGH severity vulnerability detected by our security scanner.

Vulnerability Details

  • Rule ID: yaml.github-actions.security.run-shell-injection.run-shell-injection
  • File: .github/actions/dynamatrix/action.yml
  • Description: Using variable interpolation ${{...}} with github context data in a run: step could allow an attacker to inject their own code into the runner. This would allow them to steal secrets and code. github context data can have arbitrary user input and should be treated as untrusted. Instead, use an intermediate environment variable with env: to store the data and use the environment variable in the run: script. Be sure to use double-quotes the environment variable, like this: "$ENVVAR".

Changes Made

This automated fix addresses the vulnerability by applying security best practices.

Files Modified

  • .github/actions/dynamatrix/action.yml

Verification

This fix has been automatically verified through:

  • ✅ Build verification
  • ✅ Scanner re-scan
  • ✅ LLM code review

🤖 This PR was automatically generated.

…l-injection.run-shell-injection

Automatically generated security fix
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant