Skip to content

Latest commit

 

History

History
6 lines (6 loc) · 1.07 KB

File metadata and controls

6 lines (6 loc) · 1.07 KB
category majorAnalysis
  • Fixed help file descriptions for queries: actions/untrusted-checkout/critical, actions/untrusted-checkout/high, actions/untrusted-checkout/medium. Previously the messages were unclear as to why and how the vulnerabilities could occur. Additionally alter 2 patterns in the detection such that now extra sinks are detected in the following cases: scripts executed via python modules and go run in directories are detected as potential mechanisms of injection. This may lead to more results being detected by all 3 queries.
  • Adjusted actions/untrusted-checkout/critical to align more with other untrusted resource queries, where the alert location is the location where the artifact is obtained from (the checkout point). This aligns with the other 2 related queries. This will cause the same alerts to re-open for closed alerts of this query.
  • Adjusted the name of actions/untrusted-checkout/high to more clearly describe which parts of the scenario are in a privileged context. This will cause the same alerts to re-open for closed alerts of this query.