-
Notifications
You must be signed in to change notification settings - Fork 3
Update bad0.yaml #2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Bridgecrew has found errors in this PR ⬇️
| uses: bridgecrewio/checkov-action@master | ||
| env: | ||
| GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}} | ||
| GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suspicious use of netcat with IP address
Resource: jobs.bridgecrew.steps.Run checkov | ID: BC_GITHUB_ACTION_4
| bridgecrew2: | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - name: Run checkov |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure ACTIONS_ALLOW_UNSECURE_COMMANDS isn't true on environment variables
Resource: jobs.bridgecrew2.steps.Run checkov | ID: BC_GITHUB_ACTION_1
Description
GitHub Actions has an environment variable flag called `ACTIONS_ALLOW_UNSECURE_COMMANDS` that allows GHA workflows to run deprecated commands `set-env` and `add-path`. These are vulnerable commands that should not be used as they expose accounts to potential credential theft or code injection.| uses: bridgecrewio/checkov-action@master | ||
| env: | ||
| GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}} | ||
| GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suspicious use of curl with secrets
Resource: jobs.bridgecrew.steps.Run checkov | ID: BC_GITHUB_ACTION_3
| uses: bridgecrewio/checkov-action@master | ||
| env: | ||
| GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}} | ||
| GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure ACTIONS_ALLOW_UNSECURE_COMMANDS isn't true on environment variables
Resource: jobs.bridgecrew.steps.Run checkov | ID: BC_GITHUB_ACTION_1
Description
GitHub Actions has an environment variable flag called `ACTIONS_ALLOW_UNSECURE_COMMANDS` that allows GHA workflows to run deprecated commands `set-env` and `add-path`. These are vulnerable commands that should not be used as they expose accounts to potential credential theft or code injection.| bridgecrew2: | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - name: Run checkov |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suspicious use of netcat with IP address
Resource: jobs.bridgecrew2.steps.Run checkov | ID: BC_GITHUB_ACTION_4
| bridgecrew2: | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - name: Run checkov |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No description provided.