Skip to content

Commit e6a50fb

Browse files
Sharra-writesJarLobwrslatz
committed
Update content/actions/how-tos/security-for-github-actions/security-guides/security-hardening-for-github-actions.md
Co-authored-by: Jaroslav Lobačevski <[email protected]> Co-authored-by: Will Slattum <[email protected]>
1 parent bccd376 commit e6a50fb

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/actions/reference/security/secure-use.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ Avoid using the `pull_request_target` and `workflow_run` workflow triggers if no
125125

126126
### Do not use the `pull_request_target` and `workflow_run` workflow triggers with untrusted content
127127

128-
Avoid using the `pull_request_target` and `workflow_run` workflow triggers with untrusted pull requests or code content. Workflows that use these triggers must not explicitly checkout untrusted code, including from pull request forks or from repositories that are not under your control.
128+
Avoid using the `pull_request_target` and `workflow_run` workflow triggers with untrusted pull requests or code content. Workflows that use these triggers must not explicitly checkout untrusted code, including from pull request forks or from repositories that are not under your control. Workflows triggered on `workflow_run` should treat artifacts uploaded from other workflows with caution (i.e. as untrusted).
129129

130130
### Use CodeQL to detect potentially vulnerable workflows
131131

0 commit comments

Comments
 (0)