Skip to content

Commit e7fdfd0

Browse files
committed
Merge branch 'main' into nth
2 parents f5b9691 + 7644012 commit e7fdfd0

File tree

484 files changed

+4682
-3196
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

484 files changed

+4682
-3196
lines changed

MODULE.bazel

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ local_path_override(
1414

1515
# see https://registry.bazel.build/ for a list of available packages
1616

17-
bazel_dep(name = "platforms", version = "0.0.10")
17+
bazel_dep(name = "platforms", version = "0.0.11")
1818
bazel_dep(name = "rules_go", version = "0.50.1")
1919
bazel_dep(name = "rules_pkg", version = "1.0.1")
2020
bazel_dep(name = "rules_nodejs", version = "6.2.0-codeql.1")
@@ -28,7 +28,7 @@ bazel_dep(name = "rules_kotlin", version = "2.0.0-codeql.1")
2828
bazel_dep(name = "gazelle", version = "0.40.0")
2929
bazel_dep(name = "rules_dotnet", version = "0.17.4")
3030
bazel_dep(name = "googletest", version = "1.14.0.bcr.1")
31-
bazel_dep(name = "rules_rust", version = "0.52.2")
31+
bazel_dep(name = "rules_rust", version = "0.57.1")
3232
bazel_dep(name = "zstd", version = "1.5.5.bcr.1")
3333

3434
bazel_dep(name = "buildifier_prebuilt", version = "6.4.0", dev_dependency = True)
@@ -53,15 +53,6 @@ use_repo(rust, "rust_toolchains")
5353

5454
register_toolchains("@rust_toolchains//:all")
5555

56-
rust_host_tools = use_extension("@rules_rust//rust:extensions.bzl", "rust_host_tools")
57-
58-
# Don't download a second toolchain as host toolchain, make sure this is the same version as above
59-
# The host toolchain is used for vendoring dependencies.
60-
rust_host_tools.host_tools(
61-
edition = RUST_EDITION,
62-
version = RUST_VERSION,
63-
)
64-
6556
# deps for python extractor
6657
# keep in sync by running `misc/bazel/3rdparty/update_cargo_deps.sh`
6758
py_deps = use_extension("//misc/bazel/3rdparty:py_deps_extension.bzl", "p")

actions/ql/src/Security/CWE-077/EnvPathInjectionMedium.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
* @name PATH Enviroment Variable built from user-controlled sources
33
* @description Building the PATH environment variable from user-controlled sources may alter the execution of following system commands
44
* @kind path-problem
5-
* @problem.severity warning
5+
* @problem.severity error
66
* @security-severity 5.0
7-
* @precision high
7+
* @precision medium
88
* @id actions/envpath-injection/medium
99
* @tags actions
1010
* security

actions/ql/src/Security/CWE-077/EnvVarInjectionMedium.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
* @name Enviroment Variable built from user-controlled sources
33
* @description Building an environment variable from user-controlled sources may alter the execution of following system commands
44
* @kind path-problem
5-
* @problem.severity warning
5+
* @problem.severity error
66
* @security-severity 5.0
7-
* @precision high
7+
* @precision medium
88
* @id actions/envvar-injection/medium
99
* @tags actions
1010
* security

actions/ql/src/Security/CWE-275/MissingActionsPermissions.ql

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@
33
* @description Workflows should contain permissions to provide a clear understanding has permissions to run the workflow.
44
* @kind problem
55
* @security-severity 5.0
6-
* @problem.severity recommendation
6+
* @problem.severity warning
77
* @precision high
88
* @id actions/missing-workflow-permissions
99
* @tags actions
1010
* maintainability
11+
* security
1112
* external/cwe/cwe-275
1213
*/
1314

actions/ql/src/Security/CWE-312/ExcessiveSecretsExposure.ql

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
* @name Excessive Secrets Exposure
33
* @description All organization and repository secrets are passed to the workflow runner.
44
* @kind problem
5-
* @problem.severity recommendation
5+
* @precision high
6+
* @problem.severity warning
67
* @id actions/excessive-secrets-exposure
78
* @tags actions
89
* security

actions/ql/src/Security/CWE-829/ArtifactPoisoningMedium.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
* @name Artifact poisoning
33
* @description An attacker may be able to poison the workflow's artifacts and influence on consequent steps.
44
* @kind path-problem
5-
* @problem.severity warning
6-
* @precision high
5+
* @problem.severity error
6+
* @precision medium
77
* @security-severity 5.0
88
* @id actions/artifact-poisoning/medium
99
* @tags actions

actions/ql/src/Security/CWE-829/UnpinnedActionsTag.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
* @description Using a tag for a non-immutable Action that is not pinned to a commit can lead to executing an untrusted Action through a supply chain attack.
44
* @kind problem
55
* @security-severity 5.0
6-
* @problem.severity recommendation
7-
* @precision high
6+
* @problem.severity warning
7+
* @precision medium
88
* @id actions/unpinned-tag
99
* @tags security
1010
* actions
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
category: breaking
3+
---
4+
* The following queries have been removed from the `code-scanning` and `security-extended` suites.
5+
Any existing alerts for these queries will be closed automatically.
6+
* `actions/if-expression-always-true/critical`
7+
* `actions/if-expression-always-true/high`
8+
* `actions/unnecessary-use-of-advanced-config`
9+
10+
* The following query has been moved from the `code-scanning` suite to the `security-extended`
11+
suite. Any existing alerts for this query will be closed automatically unless the analysis is
12+
configured to use the `security-extended` suite.
13+
* `actions/unpinned-tag`
14+
* The following queries have been added to the `security-extended` suite.
15+
* `actions/unversioned-immutable-action`
16+
* `actions/envpath-injection/medium`
17+
* `actions/envvar-injection/medium`
18+
* `actions/code-injection/medium`
19+
* `actions/artifact-poisoning/medium`
20+
* `actions/untrusted-checkout/medium`
Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,4 @@
11
- description: Standard Code Scanning queries for GitHub Actions
2-
- queries: '.'
3-
- include:
4-
problem.severity:
5-
- error
6-
- recommendation
7-
- exclude:
8-
tags contain:
9-
- experimental
10-
- debug
11-
- internal
2+
- queries: .
3+
- apply: code-scanning-selectors.yml
4+
from: codeql/suite-helpers
Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,4 @@
11
- description: Security-extended queries for GitHub Actions
2-
- import: codeql-suites/actions-code-scanning.qls
2+
- queries: .
3+
- apply: security-extended-selectors.yml
4+
from: codeql/suite-helpers

0 commit comments

Comments
 (0)