- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
ID: github-actions/script-injection
Language: YAML
Severity: Warning
Category: Security
As detailed in Security hardening for GitHub Actions - GitHub Docs, it is possible for an attacker to inject scripts through PR, branch, commit names, and more.
Avoid using user input in your actions shell scripts, and if you must, consider storing them first in an environment variable to escape them properly.
Read Cycode Discovers a Supply Chain Vulnerability in Bazel - Cycode if you wanna see a concrete exploitation of such mechanism.
jobs:
build-and-publish:
runs-on: ubuntu-latest
steps:
- name: Echo PR title
run: |
title="${{ github.event.pull_request.title }}"
echo $title
permissions:
contents: read
jobs:
build-and-publish:
runs-on: ubuntu-latest
steps:
- name: Echo PR title
env:
TITLE: ${{ github.event.pull_request.title }}
run: |
echo $TITLE
- name: Echo runner tytle
run: |
echo "${{ runner.name }}"
|
|
For more information, please read the Code Analysis documentation
Identify code vulnerabilities directly in yourVS Code editor
Identify code vulnerabilities directly inJetBrains products