Static Analysis Report - 2026-03-23 #22385
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-03-24T06:47:16.945Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Daily static analysis scan completed for 177 workflows using zizmor, poutine, and actionlint. All workflows compiled successfully (0 errors, 21 warnings).
Notable change today: zizmor
template-injectionfindings spiked from 3 → 49 (+46), now affecting 23 workflows — the most significant new finding compared to yesterday's baseline.Findings by Tool
Clustered Findings by Tool and Type
Zizmor Security Findings
Poutine Supply Chain Findings
Actionlint Linting Issues
Top Priority Issues
1. Poutine: untrusted_checkout_exec — Day 9 Unresolved⚠️
smoke-workflow-call,smoke-workflow-call-with-inputsbashcommands using runner-temp scripts. Poutine flags this as Arbitrary Code Execution from Untrusted Code Changes.2. Zizmor: template-injection Spike (+46 new findings) 🆕
$\{\{ ... }}) used directly inrun:scripts without intermediate env variables, enabling potential code injection if untrusted data reaches the expression.3. Zizmor: github-env (High) — Persistent⚠️
ci-doctor,dev-hawkGITHUB_ENVorGITHUB_OUTPUTenvironment files with potentially user-controlled content. Writing attacker-controlled values to these files can lead to environment variable injection or step output poisoning.Fix Suggestion: template-injection
Issue: Code injection via template expansion
Severity: Informational
Affected Workflows: 23 workflows (49 findings)
Prompt to Copilot Agent:
All Findings Details
Zizmor High Severity Findings
ci-doctor — github-env (High)
ci-doctor.lock.ymldev-hawk — github-env (High)
dev-hawk.lock.ymldaily-cli-performance — unpinned-uses (High)
daily-cli-performance.lock.ymlissue-monster — unpinned-uses (High)
issue-monster.lock.ymlPoutine Findings Detail
smoke-workflow-call & smoke-workflow-call-with-inputs — untrusted_checkout_exec (Error)
copilot-setup-steps & daily-copilot-token-report — unverified_script_exec (Note)
curl ... | bashpattern fetching fromraw.githubusercontent.comsmoke-copilot-arm — pr_runs_on_self_hosted (Warning)
ubuntu-24.04-arm)Compiler Warnings Summary
vulnerability-alerts: readpermission (usesdependabottoolset)rate-limitfeaturepush-to-pull-request-branchtarget warningsweb-searchtooldependencies(APM) featureHistorical Trends
Persistent unresolved issue:
poutine untrusted_checkout_execin smoke-workflow-call variants — unresolved for 9 consecutive days.Recommendations
poutine untrusted_checkout_execinsmoke-workflow-callandsmoke-workflow-call-with-inputs(day 9 unresolved — highest severity poutine finding).github-env(High) issues inci-doctoranddev-hawk.daily-cli-performanceandissue-monster.vulnerability-alerts: readpermission to the 7 workflows using thedependabottoolset.Next Steps
poutine untrusted_checkout_execin smoke-workflow-call variants (critical, day 9)github-envHigh findings in ci-doctor and dev-hawkvulnerability-alerts: readpermissions to 7 workflowsReferences:
Beta Was this translation helpful? Give feedback.
All reactions