Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible run-shell-injection #180

Open
jsf9k opened this issue Nov 20, 2023 · 0 comments
Open

Possible run-shell-injection #180

jsf9k opened this issue Nov 20, 2023 · 0 comments

Comments

@jsf9k
Copy link
Member

jsf9k commented Nov 20, 2023

Hi Team, one comment, possible run-shell-injection severity high at .github/workflows/build.yml line 187. Using variable interpolation with GitHub context data in a run: step could allow an attacker to inject their own code into the runner. GitHub context data can have user input and should be treated as untrusted. Alternatively, you can use an intermediate environment variable with env: to store the data and use the environment variable in the run: script. Also, be sure to use double-quotes with the environment variable, like: "$ENVVAR".

Originally posted by @dv4harr10 in cisagov/client-cert-update#53 (comment)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant