Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Potential fix for code scanning alert no. 33: Expression injection in Actions #2745

Closed
wants to merge 1 commit into from

Conversation

fnikolai
Copy link
Collaborator

Potential fix for https://github.com/superduper-io/superduper/security/code-scanning/33

To fix the problem, we need to avoid using the commit message directly in the run block. Instead, we should set the commit message to an environment variable and use shell syntax to read the environment variable. This will prevent any potential injection.

  • Set the commit message to an environment variable.
  • Use the environment variable in the shell script to avoid direct interpolation.

Suggested fixes powered by Copilot Autofix. Review carefully before merging.

… Actions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@fnikolai fnikolai marked this pull request as ready for review January 20, 2025 10:40
@fnikolai fnikolai requested a review from blythed January 20, 2025 10:40
@blythed blythed closed this Jan 31, 2025
@blythed blythed deleted the alert-autofix-33 branch January 31, 2025 20:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants