File tree Expand file tree Collapse file tree
javascript/ql/src/Security/CWE-094 Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1212
1313 </p >
1414
15+ <p >
16+ Code injection in GitHub actions may allow an attacker to
17+ exfiltrate the temporary GitHub repository authorization token.
18+ The token has write access to the repository, and thus an attacker
19+ can use it to modify the repository.
20+ </p >
21+
1522 </overview >
1623
1724 <recommendation >
1825
1926 <p >
20-
2127 The best practice to avoid code injection vulnerabilities
2228 in GitHub workflows is to set the untrusted input value of the expression
2329 to an intermediate environment variable.
24-
2530 </p >
2631
2732 </recommendation >
4954
5055 <references >
5156 <li >GitHub Security Lab Research: <a href =" https://securitylab.github.com/research/github-actions-untrusted-input" >Keeping your GitHub Actions and workflows secure: Untrusted input</a >.</li >
57+ <li >GitHub Docs: <a href =" https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions" >Security hardening for GitHub Actions</a >.</li >
5258 </references >
5359
5460</qhelp >
You can’t perform that action at this time.
0 commit comments