Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: GitHub workflow script injection #1169

Merged
merged 1 commit into from
Nov 13, 2024
Merged

Conversation

joycebrum
Copy link
Contributor

Hi! Joyce from Google's Open Source Security Team (GOSST) here. This PR prevents script injection in your GitHub workflows by parsing github.event.pull_request.head.ref into an environment variable before use.

More info on this threat: Keeping your GitHub Actions and workflows secure Part 2: Untrusted input.

Any questions, let me know!

Thanks!

Signed-off-by: Joyce Brum <joycebrum@google.com>
@joycebrum joycebrum requested a review from a team as a code owner November 13, 2024 18:49
Copy link
Member

@codyoss codyoss left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the context!

@codyoss codyoss added the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Nov 13, 2024
@kokoro-team kokoro-team removed the kokoro:force-run Add this label to force Kokoro to re-run the tests. label Nov 13, 2024
@codyoss codyoss merged commit 65e8d21 into googleapis:main Nov 13, 2024
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants