Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using unsafe GitHub Actions trigger may allow privilege escalation via CI/CD #1847

Closed
tolgaOzen opened this issue Dec 17, 2024 — with Aikido Issues · 0 comments
Closed
Labels

Comments

Copy link
Member

Find more live information in Aikido here: https://app.aikido.dev/queue?sidebarIssue=4402684&groupId=6798&sidebarIssueTask=134520&sidebarTab=tasks

==== Scope ====
This task includes issues in the following code repository:

  • permify: .github/workflows/validate-pr-title.yml

==== TLDR ====
Using pull_request_target or workflow_run as a trigger is not recommended, as it may allow an attacker to elevate its privileges via the CI/CD pipeline by exfiltrating secrets (e.g. by reading out the caches of the GitHub Actions pipeline or listing loaded secrets in the environment). If the affected repository is open source, the attacker doesn't have to be an insider but could be any GitHub user.

==== How to fix ====
Avoid using pull_request_target or workflow_run as a trigger.

@tolgaOzen tolgaOzen added the high label Dec 17, 2024 — with Aikido Issues
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant