Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

dangerous-triggers: change persona when permissions are constrained? #398

Open
woodruffw opened this issue Jan 6, 2025 · 3 comments
Open
Assignees

Comments

@woodruffw
Copy link
Owner

Filing this so I don't forget about it. Needs more thought.

The risk of a pull_request_target or similar is significantly diminished when permissions: {} or similarly constrained. We should consider emitting a "pedantic" or "auditor"-only finding in these cases.

h/t @MikeMcQuaid for raising 🙂

@woodruffw woodruffw self-assigned this Jan 6, 2025
@MikeMcQuaid
Copy link

Perhaps somewhat related: pull_request_target that never actually uses e.g. actions/checkout to checkout the relevant code.

@Holzhaus
Copy link

Whe might also allowlist the "official" issue/PR labeler that the GitHub suggests: https://github.com/actions/labeler?tab=readme-ov-file#create-workflow

So if there is only one step, and that step uses: actions/labeler we could reduce the severity.

@woodruffw
Copy link
Owner Author

Whe might also allowlist the "official" issue/PR labeler that the GitHub suggests: actions/labeler#create-workflow

So if there is only one step, and that step uses: actions/labeler we could reduce the severity.

Yep. There's a whole slew of these, which effectively generalize into "stencils"/patterns that zizmor should know about as exceptions to general audits. I'm open to ideas on best to express these in a way that's composable across multiple audits 🙂

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants