Skip to content

Security issue: possible command injection in GitHub Actions workflow #1

Security issue: possible command injection in GitHub Actions workflow

Security issue: possible command injection in GitHub Actions workflow #1

Workflow file for this run

name: Summarize new issues
on:
issues:
types: [opened]
permissions:
contents: read
jobs:
summary:
runs-on: ubuntu-latest
permissions:
issues: write
contents: read
concurrency:
group: summary-${{ github.ref }}
cancel-in-progress: false
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@a90bcbc6539c36a85cdfeb73f7e2f433735f215b # v2.15.0
with:
egress-policy: audit
- name: Checkout repository
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
- name: Run AI inference
id: inference
uses: actions/ai-inference@e09e65981758de8b2fdab13c2bfb7c7d5493b0b6 # v2.0.7
with:
prompt: |
Summarize the following GitHub issue in one paragraph:
Title: ${{ github.event.issue.title }}
Body: ${{ github.event.issue.body }}
- name: Comment with AI summary
run: |
gh issue comment $ISSUE_NUMBER --body '${{ steps.inference.outputs.response }}'
env:
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
ISSUE_NUMBER: ${{ github.event.issue.number }}
RESPONSE: ${{ steps.inference.outputs.response }}