You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix command injection in required-field-check workflow (#3642)
* Fix command injection in required-field-check workflow (CWE-78)
Remediate OS command injection vulnerability where PR filenames containing
shell metacharacters (e.g., $()) could execute arbitrary commands on the
Actions runner. Untrusted filenames from the GitHub API were interpolated
unquoted into bash via ${{ }} expressions.
Fix: output files as JSON array, pass through env variable (not inline
interpolation), parse safely with jq, and build args with proper quoting.
Ref: HackerOne #3526875
Co-Authored-By: Claude Opus 4.6 <[email protected]>
* Skip required-field warnings for new destinations and new actions
New destinations have no existing customers and new actions have no
existing configurations, so adding required fields to them is safe.
Only warn when required fields are added to actions/settings that
already exist on main.
Co-Authored-By: Claude Opus 4.6 <[email protected]>
* noop
* Use printf instead of echo for safer JSON piping to jq
* Address Copilot review: pipefail, jq -e, and paginate PR files
- set -euo pipefail on both bash steps so pipeline failures from
./bin/run are not masked by jq's exit code
- jq -ce to fail on empty/null output
- github.paginate() with per_page:100 to fetch all changed files
(github.request only returned the first page, default 30 files)
Co-Authored-By: Claude Sonnet 4.6 <[email protected]>
---------
Co-authored-by: Claude Opus 4.6 <[email protected]>
0 commit comments