-
Notifications
You must be signed in to change notification settings - Fork 296
Closed as not planned
Closed as not planned
Copy link
Labels
Description
Objective
Fix a Medium severity security vulnerability (artipacked) in the daily-copilot-token-report workflow identified by zizmor in discussion #19004.
Context
The daily-copilot-token-report.lock.yml workflow uses actions/checkout which by default persists credentials in .git/config. If a subsequent artifact upload step captures the workspace, the short-lived GITHUB_TOKEN could be included in the artifact and accessible to anyone with read access to the repository's Actions artifacts.
Source: Static Analysis Report - 2026-03-01, zizmor artipacked finding at line 300.
Approach
- Open
.github/workflows/daily-copilot-token-report.md(the source markdown file) - Locate the
actions/checkoutstep in the workflow frontmatter or steps - Add
persist-credentials: falseto the checkout step configuration:- uses: actions/checkout@v4 with: persist-credentials: false
- Run
make recompileto regeneratedaily-copilot-token-report.lock.yml - Verify the lock file contains
persist-credentials: falseon the checkout step
Files to Modify
.github/workflows/daily-copilot-token-report.md— addpersist-credentials: falseto checkout step.github/workflows/daily-copilot-token-report.lock.yml— regenerated viamake recompile
Acceptance Criteria
-
actions/checkoutstep indaily-copilot-token-reporthaspersist-credentials: false - Lock file is regenerated and contains the fix
-
make agent-finishpasses without errors
Generated by Plan Command for issue #discussion #19004
- expires on Mar 3, 2026, 6:38 AM UTC
Reactions are currently unavailable