Skip to content

Commit 77d3c95

Browse files
committed
Merge branch 'main' into trim
2 parents 432d4b0 + e05c030 commit 77d3c95

File tree

187 files changed

+11493
-1420
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

187 files changed

+11493
-1420
lines changed

actions/ql/lib/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
## 0.4.7
2+
3+
No user-facing changes.
4+
15
## 0.4.6
26

37
### Bug Fixes
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
## 0.4.7
2+
3+
No user-facing changes.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
---
2-
lastReleaseVersion: 0.4.6
2+
lastReleaseVersion: 0.4.7

actions/ql/lib/qlpack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
name: codeql/actions-all
2-
version: 0.4.7-dev
2+
version: 0.4.8-dev
33
library: true
44
warnOnImplicitThis: true
55
dependencies:

actions/ql/src/CHANGELOG.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,9 @@
1+
## 0.5.4
2+
3+
### Bug Fixes
4+
5+
* Alerts produced by the query `actions/missing-workflow-permissions` now include a minimal set of recommended permissions in the alert message, based on well-known actions seen within the workflow file.
6+
17
## 0.5.3
28

39
### Bug Fixes

actions/ql/src/Security/CWE-077/EnvVarInjectionMedium.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ An attacker could craft a malicious artifact that writes dangerous environment v
109109
110110
### Exploitation
111111
112-
An attacker is be able to run arbitrary code by injecting environment variables such as `LD_PRELOAD`, `BASH_ENV`, etc.
112+
An attacker would be able to run arbitrary code by injecting environment variables such as `LD_PRELOAD`, `BASH_ENV`, etc.
113113
114114
## References
115115

actions/ql/src/Security/CWE-275/MissingActionsPermissions.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
22
* @name Workflow does not contain permissions
3-
* @description Workflows should contain permissions to provide a clear understanding has permissions to run the workflow.
3+
* @description Workflows should contain explicit permissions to restrict the scope of the default GITHUB_TOKEN.
44
* @kind problem
55
* @security-severity 5.0
66
* @problem.severity warning

actions/ql/src/Security/CWE-312/ExcessiveSecretsExposure.ql

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
* @description All organization and repository secrets are passed to the workflow runner.
44
* @kind problem
55
* @precision high
6+
* @security-severity 5.0
67
* @problem.severity warning
78
* @id actions/excessive-secrets-exposure
89
* @tags actions

actions/ql/src/Security/CWE-312/UnmaskedSecretExposure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22

33
## Description
44

5-
Secrets derived from other secrets are not know to the workflow runner and therefore not masked unless explicitly registered.
5+
Secrets derived from other secrets are not known to the workflow runner, and therefore are not masked unless explicitly registered.
66

77
## Recommendations
88

9-
Avoid defining non-plain secrets. For example, do not define a new secret containing a JSON object and then read properties out of it from the workflow since these read values will not be masked by the workflow runner.
9+
Avoid defining non-plain secrets. For example, do not define a new secret containing a JSON object and then read properties out of it from the workflow, since these read values will not be masked by the workflow runner.
1010

1111
## Examples
1212

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
---
2+
category: fix
3+
---
4+
* Assigned a `security-severity` to the query `actions/excessive-secrets-exposure`.

0 commit comments

Comments
 (0)