You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Daily static analysis scan of 172 workflows using zizmor, poutine, and actionlint. Today's scan identifies a new High severity finding (unpinned-uses in issue-monster) and notes that the critical untrusted_checkout_exec poutine finding remains unresolved for a third consecutive day.
New Issues: 1 (unpinned-uses High - issue-monster)
Persisting Critical: poutine untrusted_checkout_exec day 3 unresolved
Findings by Tool
Tool
Total
Critical
High
Medium
Low
Info/Note
zizmor (security)
3,756
0
1
3,732
20
3
poutine (supply chain)
18
0
0
0 (6 error)
1 (warning)
11 (note)
actionlint (linting)
42
—
—
—
—
42 (error)
compiler
41
—
—
—
—
41 (warning)
🔴 New Issue Today
unpinned-uses (High) — issue-monster workflow
First detected: 2026-03-17 Location: issue-monster.lock.yml:1414 Code: uses: actions/github-script@v8 Reference: (docs.zizmor.sh/redacted)
The issue-monster workflow references actions/github-script using the mutable @v8 tag instead of a pinned SHA. If the tag is ever moved to a malicious commit, the workflow will silently execute attacker-controlled code with full access to the workflow's secrets and permissions.
Status: Introduced 2026-03-15, still unresolved after 3 days
3. secrets-outside-env (Medium) — systemic
Tool: zizmor
Count: ~3,730 across all 172 workflows
Impact: Secrets exposed in workflow logs rather than protected environment variables
Reference: (docs.zizmor.sh/redacted)
Fix Suggestion: unpinned-uses in issue-monster
Issue: actions/github-script@v8 used without SHA pin Severity: High Affected Workflows: 1 (issue-monster)
Prompt to Copilot Agent:
You are fixing a security vulnerability identified by zizmor in a GitHub Actions workflow.
**Vulnerability**: unpinned-uses — Unpinned action reference
**Rule**: (docs.zizmor.sh/redacted)
**Severity**: High
**Location**: `.github/workflows/issue-monster.md` (compiled line 1414)
**Current Issue**:
The workflow uses `actions/github-script@v8` — a mutable tag reference. If the `v8` tag is
reassigned (intentionally or via compromise), the workflow silently executes attacker-controlled
code with access to repository secrets and permissions.
**Required Fix**:
1. Look up the current commit SHA for `actions/github-script` tag `v8`:
`gh api repos/actions/github-script/git/ref/tags/v8 --jq .object.sha`
2. In `.github/workflows/issue-monster.md`, find the step using `actions/github-script@v8`
3. Replace with the full SHA and add a version comment
**Example**:
Before:
```yaml
uses: actions/github-script@v8
```
After:
```yaml
uses: actions/github-script@60a0d83039c74a4aee543508d2ffcb1c3799cdea # v8
```
Note: The `.lock.yml` is auto-generated from the `.md` source. Always edit the `.md` file.
After fixing, the workflow will be recompiled automatically on next run.
Please apply this fix to `.github/workflows/issue-monster.md`.
All Findings Details
issue-monster.lock.yml
Line 1414: unpinned-uses (High) — actions/github-script@v8 not pinned to SHA
Multiple lines: secrets-outside-env (Medium)
smoke-workflow-call.lock.yml
Line 173: untrusted_checkout_exec (Error) — bash execution with untrusted checkout
Line 275: untrusted_checkout_exec (Error)
Line 279: untrusted_checkout_exec (Error)
Line 846: secrets-inherit (Medium)
smoke-workflow-call-with-inputs.lock.yml
Line 170: untrusted_checkout_exec (Error)
Line 275: untrusted_checkout_exec (Error)
Line 279: untrusted_checkout_exec (Error)
smoke-copilot-arm.lock.yml
Line 319: pr_runs_on_self_hosted (Warning) — runs-on: ubuntu-24.04-arm
daily-copilot-token-report.lock.yml
Line 308: artipacked (Medium) — credential persistence via artifact
Line 325: unverified_script_exec (Note) — curl | bash from raw.githubusercontent.com
Line 337: github_action_from_unverified_creator_used (Note) — astral-sh/setup-uv
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Daily static analysis scan of 172 workflows using zizmor, poutine, and actionlint. Today's scan identifies a new High severity finding (
unpinned-usesinissue-monster) and notes that the criticaluntrusted_checkout_execpoutine finding remains unresolved for a third consecutive day.unpinned-usesHigh - issue-monster)untrusted_checkout_execday 3 unresolvedFindings by Tool
🔴 New Issue Today
unpinned-uses(High) — issue-monster workflowFirst detected: 2026-03-17
Location:
issue-monster.lock.yml:1414Code:
uses: actions/github-script@v8Reference: (docs.zizmor.sh/redacted)
The
issue-monsterworkflow referencesactions/github-scriptusing the mutable@v8tag instead of a pinned SHA. If the tag is ever moved to a malicious commit, the workflow will silently execute attacker-controlled code with full access to the workflow's secrets and permissions.Clustered Findings by Tool and Type
Zizmor Security Findings
secrets-outside-envartipackedsecrets-inheritunpinned-usesobfuscationtemplate-injectionPoutine Supply Chain Findings
untrusted_checkout_execpr_runs_on_self_hostedgithub_action_from_unverified_creator_usedunverified_script_execunpinnable_actionActionlint Linting Issues
permissionscopilot-requestsis a valid GitHub Copilot permissionexpressionneeds.activation.outputs.activatedproperty type mismatchshellcheck{ cmd1; cmd2; } >> fileinstead of individual redirectsTop Priority Issues
1. 🆕
unpinned-uses(High) — issue-monsterissue-monster.lock.yml:1414—actions/github-script@v82. 🔴
untrusted_checkout_exec(Error) — day 3 unresolvedbashscripts3.
secrets-outside-env(Medium) — systemicFix Suggestion:
unpinned-usesin issue-monsterIssue:
actions/github-script@v8used without SHA pinSeverity: High
Affected Workflows: 1 (issue-monster)
Prompt to Copilot Agent:
All Findings Details
issue-monster.lock.yml
unpinned-uses(High) —actions/github-script@v8not pinned to SHAsecrets-outside-env(Medium)smoke-workflow-call.lock.yml
untrusted_checkout_exec(Error) — bash execution with untrusted checkoutuntrusted_checkout_exec(Error)untrusted_checkout_exec(Error)secrets-inherit(Medium)smoke-workflow-call-with-inputs.lock.yml
untrusted_checkout_exec(Error)untrusted_checkout_exec(Error)untrusted_checkout_exec(Error)smoke-copilot-arm.lock.yml
pr_runs_on_self_hosted(Warning) — runs-on: ubuntu-24.04-armdaily-copilot-token-report.lock.yml
artipacked(Medium) — credential persistence via artifactunverified_script_exec(Note) — curl | bash from raw.githubusercontent.comgithub_action_from_unverified_creator_used(Note) — astral-sh/setup-uvcontribution-check.lock.yml
template-injection(Informational) ×3ace-editor.lock.yml
expressionerror —activatedproperty not in output typerelease.lock.yml
shellcheckSC2129 — use grouped redirectslink-check.yml
github_action_from_unverified_creator_used(Note) — gaurav-nelson/github-action-markdown-link-check ×2copilot-setup-steps.yml
unverified_script_exec(Note) — curl | bashgithub_action_from_unverified_creator_used(Note) — astral-sh/setup-uvsuper-linter.lock.yml
github_action_from_unverified_creator_used(Note) — super-linter/super-lintermcp-inspector.lock.yml
github_action_from_unverified_creator_used(Note) — astral-sh/setup-uvvet.yml
github_action_from_unverified_creator_used(Note) — safedep/vet-action@v1All other 161+ workflows
secrets-outside-env(Medium) — secrets referenced without dedicated environmentHistorical Trends
Notable changes since 2026-03-09 (when zizmor
secrets-outside-envaudit was introduced):untrusted_checkout_execappeared 2026-03-15 and remains unresolved (day 3)unpinned-usesHigh in issue-monster (+1)New Issues This Scan
unpinned-uses(High) in issue-monster —actions/github-script@v8(first seen today)Still Unresolved Critical Issues
untrusted_checkout_exec(6 errors, day 3) — smoke-workflow-call, smoke-workflow-call-with-inputsRecommendations
unpinned-uses(High) inissue-monster.md: pinactions/github-script@v8to SHAuntrusted_checkout_execin smoke-workflow-call* (day 3 unresolved)expressionerror in ace-editor (activated property type mismatch)shellcheckSC2129 in release.lock.yml (grouped redirects)secrets-outside-envsystematically across all 172 workflows (use dedicatedenv:blocks for secrets)artipackedfinding in daily-copilot-token-report (persist-credentials: false)Next Steps
actions/github-script@v8to SHA in issue-monster.md (see fix prompt above)untrusted_checkout_exec— consider addingpull-requesttrigger guardsactivatedoutput type definitionReferences:
Beta Was this translation helpful? Give feedback.
All reactions