Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit df4bfef

Browse files
committed
expand the qhelp for js/actions/injection
1 parent 48fb01f commit df4bfef

1 file changed

Lines changed: 8 additions & 2 deletions

File tree

javascript/ql/src/Security/CWE-094/ExpressionInjection.qhelp

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,16 +12,21 @@
1212

1313
</p>
1414

15+
<p>
16+
Code injection in GitHub actions may allow an attacker to
17+
exfiltrate the temporary GitHub repository authorization token.
18+
The token has write access to the repository, and thus an attacker
19+
can use it to modify the repository.
20+
</p>
21+
1522
</overview>
1623

1724
<recommendation>
1825

1926
<p>
20-
2127
The best practice to avoid code injection vulnerabilities
2228
in GitHub workflows is to set the untrusted input value of the expression
2329
to an intermediate environment variable.
24-
2530
</p>
2631

2732
</recommendation>
@@ -49,6 +54,7 @@
4954

5055
<references>
5156
<li>GitHub Security Lab Research: <a href="https://securitylab.github.com/research/github-actions-untrusted-input">Keeping your GitHub Actions and workflows secure: Untrusted input</a>.</li>
57+
<li>GitHub Docs: <a href="https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions">Security hardening for GitHub Actions</a>.</li>
5258
</references>
5359

5460
</qhelp>

0 commit comments

Comments
 (0)