Skip to content

Conversation

@taysmith-test
Copy link
Owner

No description provided.

Copy link

@bridgecrew bridgecrew bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bridgecrew has found errors in this PR ⬇️

uses: bridgecrewio/checkov-action@master
env:
GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}}
GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LOW   Suspicious use of netcat with IP address
    Resource: jobs.bridgecrew.steps.Run checkov | ID: BC_GITHUB_ACTION_4

bridgecrew2:
runs-on: ubuntu-latest
steps:
- name: Run checkov
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

MEDIUM   Ensure ACTIONS_ALLOW_UNSECURE_COMMANDS isn't true on environment variables
    Resource: jobs.bridgecrew2.steps.Run checkov | ID: BC_GITHUB_ACTION_1

Description

GitHub Actions has an environment variable flag called `ACTIONS_ALLOW_UNSECURE_COMMANDS` that allows GHA workflows to run deprecated commands `set-env` and `add-path`. These are vulnerable commands that should not be used as they expose accounts to potential credential theft or code injection.

uses: bridgecrewio/checkov-action@master
env:
GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}}
GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LOW   Suspicious use of curl with secrets
    Resource: jobs.bridgecrew.steps.Run checkov | ID: BC_GITHUB_ACTION_3

uses: bridgecrewio/checkov-action@master
env:
GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}}
GITHUB_TOKEN: ${{secrets.THIS_IS_A_TEST_SECRET}}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

MEDIUM   Ensure ACTIONS_ALLOW_UNSECURE_COMMANDS isn't true on environment variables
    Resource: jobs.bridgecrew.steps.Run checkov | ID: BC_GITHUB_ACTION_1

Description

GitHub Actions has an environment variable flag called `ACTIONS_ALLOW_UNSECURE_COMMANDS` that allows GHA workflows to run deprecated commands `set-env` and `add-path`. These are vulnerable commands that should not be used as they expose accounts to potential credential theft or code injection.

bridgecrew2:
runs-on: ubuntu-latest
steps:
- name: Run checkov
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LOW   Suspicious use of netcat with IP address
    Resource: jobs.bridgecrew2.steps.Run checkov | ID: BC_GITHUB_ACTION_4

bridgecrew2:
runs-on: ubuntu-latest
steps:
- name: Run checkov
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LOW   Suspicious use of curl with secrets
    Resource: jobs.bridgecrew2.steps.Run checkov | ID: BC_GITHUB_ACTION_3

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants