Open dmytro-arkhypenko opened 1 month ago
Hi @dmytro-arkhypenko, Thanks for the feedback.
Yes by default the task has access to all environment variables and the agent is creating one environment variable per pipeline variable which could lead to some unexpected leakage.
I'll see to add a new parameter useOnlyAdditionalVariables
which would limit the scope of the available variable to the replacement function to only the values declared in additionalVariables.
Hi @dmytro-arkhypenko,
The new parameter useAdditionalVariablesOnly
is now available on v5 and v6.
I have a concern that exposing all pipeline variables for replacement might give out sensitive information if replaced happened in the manifest files placed by ill-intended party.
I can't come with exact scenario of successful attack exploiting this feature, but having more control over the task behavoir would give me more confidence.
The feature I want might be implmented by introducing additional input
usePipelineVariables
, beingtrue
by default.