Static Analysis Report - 2026-03-22 #22240
Closed
Replies: 2 comments 1 reply
-
|
/plan |
Beta Was this translation helpful? Give feedback.
1 reply
-
|
This discussion has been marked as outdated by Static Analysis Report. A newer discussion is available at Discussion #22385. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Daily static analysis scan completed for 177 workflows using zizmor, poutine, and actionlint. All workflows compiled successfully (0 errors, 21 compiler warnings). The most critical open issue remains poutine
untrusted_checkout_execin the smoke workflow-call tests — now day 8 unresolved. Zizmor and actionlint raw counts are slightly up vs. yesterday, consistent with the stable 177-workflow baseline.Findings by Tool
Top Priority Issues
1.
untrusted_checkout_exec— Poutine ERROR (Day 8 Unresolved)smoke-workflow-call,smoke-workflow-call-with-inputs2.
github-env— Zizmor HIGHci-doctor,dev-hawkGITHUB_ENVenvironment file. Writing to$GITHUB_ENVfrom within a step can allow environment variable injection if any prior step is compromised.3.
unpinned-uses— Zizmor HIGHdaily-cli-performance,issue-monster4.
secrets-outside-env— Zizmor MEDIUM (Systemic)run:scripts without a dedicatedenv:block, exposing them in process listings. This is a systemic pattern in the compiled.lock.ymloutput.Clustered Findings by Tool
Zizmor Security Findings
secrets-outside-envobfuscationgithub-envci-doctor,dev-hawkunpinned-usesdaily-cli-performance,issue-monstertemplate-injectioncontribution-checksecrets-inheritartipackedPoutine Supply Chain Findings
untrusted_checkout_execsmoke-workflow-call,smoke-workflow-call-with-inputsgithub_action_from_unverified_creator_usedcopilot-setup-steps,daily-copilot-token-report,mcp-inspector,smoke-codex,super-linter,link-check,vetunverified_script_execcopilot-setup-steps,daily-copilot-token-reportunpinnable_action.github/actions/daily-perf-improver,.github/actions/daily-test-improverpr_runs_on_self_hostedsmoke-copilot-armActionlint Linting Issues
shellcheck(SC2086)\$\{RUNNER_TEMP}variable — systemic in generated lock filespermissionscopilot-requestsscope — not yet recognized by actionlintexpressionactivatednot defined inace-editor.lock.ymlFix Suggestion for
untrusted_checkout_execIssue: Arbitrary Code Execution from Untrusted Code Changes
Severity: Error (Critical)
Affected Workflows: 2 (
smoke-workflow-call,smoke-workflow-call-with-inputs)Days Unresolved: 8
Prompt to Copilot Agent:
Historical Trends
Trend Analysis
untrusted_checkout_exec: Introduced 2026-03-15, "resolved" 2026-03-18 for one day, re-emerged 2026-03-19. Now at day 8 with no resolution. This pattern suggests the fix was reverted or a new PR triggered the regression.Compiler Warnings Detail (21 warnings)
vulnerability-alerts: readpermission (dependabot toolset)daily-firewall-report,deep-report,dependabot-go-checker,github-mcp-structural-analysis,github-mcp-tools-report,security-review(+ 1 more)rate-limitagent-performance-analyzer,constraint-solving-potd,weekly-safe-outputs-spec-reviewpush-to-pull-request-branchtarget*without constraintssmoke-claudecopilotdoes not supportweb-searchtoolci-coach,example-workflow-analyzercommit-changes-analyzerdependencies(APM)smoke-claudeAll Poutine Findings
smoke-workflow-callandsmoke-workflow-call-with-inputs— untrusted_checkout_exec (Error)bashfor:create_prompt_first.sh,validate_prompt_placeholders.sh,print_prompt_summary.shsmoke-copilot-arm— pr_runs_on_self_hosted (Warning)runs-on: ubuntu-24.04-armcopilot-setup-steps— unverified_script_exec + github_action_from_unverified_creator_used (Note)curl ... | bashfromraw.githubusercontent.comastral-sh/setup-uv@eac588ad8def6316056a12d4907a9d4d84ff7a3bdaily-copilot-token-report— unverified_script_exec + github_action_from_unverified_creator_used (Note)curl | bashpatternastral-sh/setup-uv@eac588ad8def6316056a12d4907a9d4d84ff7a3bmcp-inspector— github_action_from_unverified_creator_used (Note)astral-sh/setup-uv@29b21a839666e60d6a2015b4010b35b7911d3590smoke-codex— github_action_from_unverified_creator_used (Note)actions-ecosystem/action-add-labels@c96b68fec76a0987cd93957189e9abd0b9a72ff1super-linter— github_action_from_unverified_creator_used (Note)super-linter/super-linter@61abc07d755095a68f4987d1c2c3d1d64408f1f9link-check.yml— github_action_from_unverified_creator_used (Note)gaurav-nelson/github-action-markdown-link-check@5c5dfc0ac2e225883c0e5f03a85311ec2830d368vet.yml— github_action_from_unverified_creator_used (Note)safedep/vet-action@v1(not pinned to SHA).github/actions/daily-perf-improver+.github/actions/daily-test-improver— unpinnable_action (Note)Recommendations
untrusted_checkout_execinsmoke-workflow-callandsmoke-workflow-call-with-inputs(day 8 unresolved — see fix prompt above)github-env(High) inci-doctoranddev-hawk— replace>> $GITHUB_ENVwith$GITHUB_OUTPUTwhere possibledaily-cli-performanceandissue-monsterto specific SHAsvulnerability-alerts: readpermission to 7 workflows using the dependabot toolsetsecrets-outside-env(3,813 findings) pattern is systemic in generated lock files — evaluate whether the framework can emit secrets viaenv:blocks to reduce this noiseuntrusted_checkout_execrecurrence pattern (resolved then re-emerged) suggests a need for a mandatory CI check on these specific workflowsReferences:
Beta Was this translation helpful? Give feedback.
All reactions