Skip to content

Commit 38a03fc

Browse files
authored
Merge pull request #1030 from AdmiringWorm/cpmr0075
(ENGTASKS-3807) (doc) Add documentation of new rule CPMR0075
2 parents c56cff9 + cd082a5 commit 38a03fc

File tree

1 file changed

+27
-0
lines changed
  • src/content/docs/en-us/community-repository/moderation/package-validator/rules

1 file changed

+27
-0
lines changed
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
order: 75
3+
xref: cpmr0075
4+
title: CPMR0075 - Script uses GitHub Comment assets (script)
5+
description: Information on how to remediate the Chocolatey Package Moderation Rule 0075
6+
ruleType: Requirement
7+
---
8+
import Callout from '@choco/components/Callout.astro';
9+
import Iframe from '@choco/components/Iframe.astro';
10+
import Xref from '@components/Xref.astro';
11+
import PackageValidatorRuleRequirement from '@components/docs/PackageValidatorRuleRequirement.mdx';
12+
13+
<PackageValidatorRuleRequirement />
14+
15+
## Issue
16+
17+
Within one or more of the automation scripts, one or more URLs were found to point to a GitHub comment file or asset.
18+
19+
## Recommended Solution
20+
21+
Use the official download location of files from the software authors that are not part of a GitHub comment.
22+
This can be URLs on their official web page, from their GitHub releases, or from a third party that is officially endorsed by the software developers.
23+
24+
## Reasoning
25+
26+
Since any user can upload files to a GitHub comment, even without publishing the comment, this can be used as an attack vector by malicious actors.
27+
To prevent such misuse from happening and affecting our users, it has been decided to disallow these types of URLs.

0 commit comments

Comments
 (0)