Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix: use env var for PR title in commitlint workflow to prevent untru…
…sted script injection (#60) ## Description Our OSSF scorecard workflow flagged this as a `Critical` security risk. Unsure of whether there is a real attack vector in our specific case. Using an environment variable to capture untrusted input in workflows is a documented security hardening best practice by GitHub as well. This should also boost our OSSF scorecard score since we have a `0` on this check. <img width="969" alt="image" src="https://github.com/defenseunicorns/zarf/assets/87675701/a07c699f-3601-44f2-b181-36f91f3637f8"> `Dangerous-Workflow` check: - https://github.com/ossf/scorecard/blob/49c0eed3a423f00c872b5c3c9f1bbca9e8aae799/docs/checks.md#dangerous-workflow Risk of script injections: - https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#understanding-the-risk-of-script-injections Example script injection attack: - https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#example-of-a-script-injection-attack Recommended fix that this PR implements: - https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
- Loading branch information