Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

dont use pull_request_target as it opens the repo for pwnage.. #813

Merged

Conversation

bj00rn
Copy link
Collaborator

@bj00rn bj00rn commented Jun 17, 2024

pull_request_target event will be run in target repo context and will have access to secrets etc!

https://securitylab.github.com/research/github-actions-preventing-pwn-requests/

@bj00rn bj00rn removed the request for review from thomasnordquist June 17, 2024 09:22
@bj00rn bj00rn force-pushed the chore/dont-use-pull-request-target-for-untrusted-code branch from ff79c33 to efc9fb9 Compare June 17, 2024 09:25
@bj00rn
Copy link
Collaborator Author

bj00rn commented Jun 17, 2024

@thomasnordquist i'll merge. It turns out, checking out an explicit commit from source branch is inherently unsafe! Any untrusted code should be run in the context of the source repo!

I suggest we change event to pull_request to make tests run in the context of the source repo, with no access to secrets

@bj00rn bj00rn merged commit 8975e7b into master Jun 17, 2024
1 of 2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant