upvote
The only way to 'harden your github actions' is to not use github actions.
reply
Makes sense tbh :)
reply
Disabling vscode/cursor extensions auto-updates also makes sense
reply
Thanks for making me aware of zizmor, just ran and fixed all issues on our core repos.
reply
You are welcome! Recently discovered it and found it genuinely useful. Fixed a bunch of issues in my workflows too :)
reply
You also need to make sure you take care using PR titles and descriptions in your GHA because if they contain `text` it *may be executed lmfao.

edited: not "will", may depending on your GHA

reply
Can you cite this? It's not YAML execution syntax, surely Github doesn't do it, the only vector I can see is if you put it unquoted into a shell script inside of a GHA yaml.
reply
reply
Yes that's it.
reply
https://github.com/orgs/community/discussions/27065

https://stackoverflow.com/questions/77090044/github-actions-...

https://www.praetorian.com/blog/pwn-request-hacking-microsof...

All you need is user content containing `backticked`, and a github action referencing that via eg "github.event.issue.title" where the shell would normally execute `backticked` as a command (like echo, cat, etc).

reply
Maybe zizmor could catch this https://github.com/zizmorcore/zizmor but not sure 100%
reply
Yeah, zizmor checks for template injection.
reply
Nice
reply