fix: pin 19 unpinned action(s),extract 2 unsafe expression(s) to env vars#7435
fix: pin 19 unpinned action(s),extract 2 unsafe expression(s) to env vars#7435dagecko wants to merge 6 commits intoOpenBB-finance:developfrom
Conversation
|
CLA signed.
|
|
Hi, @dagecko and thanks for the PR. IIUC, some of these commit SHA will not work in this context. For example, the Rust Toolchain commit is not found on branch. Can you please check these again?
|
|
Hey @deeleeramone, thanks for flagging that. I looked into it and the SHAs are all valid full 40-character commits. The "not found on branch" message you're seeing is a known GitHub UI quirk with That said, if any of these are causing CI failures or you'd prefer a different approach for specific actions, let me know and I'm happy to adjust. Hope that helps.
|
|
Hey @dagecko, this is what GitHub has to say about it, we should probably follow along.
|
|
@deeleeramone apologies for the incorrect SHAs and thank you for taking the time to dig into both of these. You were right on both counts. Fixed and pushed:
Appreciate the thorough review.
|


Security: Harden GitHub Actions workflows
Hey, I found some CI/CD security issues in this repo's GitHub Actions workflows. These are the same vulnerability classes that were exploited in the tj-actions/changed-files supply chain attack. I've been reviewing repos that are affected and submitting fixes where I can.
This PR applies mechanical fixes and flags anything else that needs a manual look. Happy to answer any questions.
Fixes applied
.github/workflows/build-desktop-osx64.yml.github/workflows/build-desktop-osxARM.yml.github/workflows/build-desktop-win64.yml.github/workflows/draft-release.yml.github/workflows/general-linting.yml.github/workflows/general-linting.yml.github/workflows/gh-branch-name-check.yml.github/workflows/gh-pr-labels.yml.github/workflows/release-desktop.yml.github/workflows/release-desktop.yml.github/workflows/test-unit-desktop-osx64.yml.github/workflows/test-unit-desktop-osxARM.yml.github/workflows/test-unit-desktop-win64.yml.github/workflows/test-unit-desktop-winARM.ymlAdditional findings (manual review recommended)
| Rule | Severity | File | Description |
| RGS-003 | high |
.github/workflows/release-desktop.yml| Filename Injection via Git Diff or File Listing || RGS-003 | high |
.github/workflows/release-desktop.yml| Filename Injection via Git Diff or File Listing || RGS-007 | medium |
.github/workflows/general-linting.yml| Unpinned Third-Party Action Using Mutable Tag |Why this matters
GitHub Actions workflows that use untrusted input in
run:blocks or reference unpinned third-party actions are vulnerable to code injection and supply chain attacks. These are the same vulnerability classes exploited in the tj-actions/changed-files incident which compromised CI secrets across thousands of repositories.How to verify
Review the diff, each change is mechanical and preserves workflow behavior:
${{ }}expressions fromrun:blocks intoenv:mappings, preventing shell injectionIf this PR is not welcome, just close it and I won't send another.