Open woodruffw opened 2 months ago
Self-hosted runners are fundamentally insecure when not run ephemerally, but there's no great way to detect this statically. So we'll likely need to make that check a pedantic-only one.
Code injection should also detect things like https://securitylab.github.com/advisories/GHSL-2024-169_Arduino-ESP32/, i.e. detect expression expansion inside of actions like actions/github-script
.
action.yml
)pull_request_target
workflow_run
: #33pypa/gh-action-pypi-publish
without trusted publishingrubygems/release-gem
without trusted publishingcontainer
/service
credentialsgh-action-pypi-publish@master
should be@release/v1
.