Replies: 1 comment 1 reply
-
|
We generally discourage usage of "random" GitHub actions and apps. It's part of why also separate build from release steps and the release part is the only get gets secrets available to them limiting what a bad actor can do. With the increase of prs with agents; being diligent about this becomes more important. I could imagine we would need to set harder limits to avoid someone missing a GitHub action detail update in a PR. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
As seen in the previous days, attackers can also leverage misconfigurations of github actions to gain access on repositories.
See(aquasecurity/trivy#10265) and resulting discussion: (aquasecurity/trivy#10278)
Is there a need for the quarkus project and quarkiverse projects to have some kind of scanning for misconfigured github actions?
Beta Was this translation helpful? Give feedback.
All reactions