Skip to content

Flag workflows that depend on a GitHub Action with injection in the same repo or same org #70

@fproulx-boostsecurity

Description

@fproulx-boostsecurity

This would be sort of a second-order / second-pass processing maybe, because we may scan a repo in an org as just a "pkg:github/", discover that it happens to be a GitHub Action (with action.yml somewhere) and later (or before) we see a workflow which depends on that action. If the action we scanned has an injection, then the workflow has a "0-day" vulnerable dep. Ideally, we need to rescan the action's repo on the actual tag / commit that is used for dependency (i.e. uses: corp/my-action@v3)

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions