fix(ci): resolve critical security issues in GitHub Actions workflows#7277
Merged
fix(ci): resolve critical security issues in GitHub Actions workflows#7277
Conversation
- Disable i-atlas-process.yml (LLM output → shell injection via issue body)
- Use env vars instead of ${{ }} interpolation in kbve-shell action,
utils-astro-deployment.yml, and utils-nx-kbve-shell.yml to prevent
command injection through workflow inputs
- Set Trivy exit-code to 1 so CRITICAL/HIGH CVEs block Docker publishing
- Add permissions (issues:write, contents:read) and timeout-minutes to
all 16 jobs in i-label.yml
Contributor
Dependency Review✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.Scanned Files
|
Atlas processing has been moved to an external application. The i-atlas-process.yml workflow is no longer needed and contained unsanitized LLM output injection risks. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This was referenced Feb 25, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
i-atlas-process.ymlpassed attacker-controlled issue bodies through an LLM, then injected unvalidated LLM output directly into shell commands via${{ }}interpolation. Changed trigger fromissues:openedtoworkflow_dispatchto disable it. Atlas processing should move to a dedicated external application.kbve-shell/action.yml,utils-astro-deployment.yml, andutils-nx-kbve-shell.ymlall interpolated${{ inputs.* }}directly intorun:blocks, allowing shell metacharacter injection. Moved inputs intoenv:variables so the shell treats them as data, not code.utils-publish-docker-image.ymlhadexit-code: 0on the Trivy scan, meaning CRITICAL/HIGH vulnerabilities were logged but never blocked publishing. Changed toexit-code: 1.permissions: {issues: write, contents: read}(was inheriting defaultwrite-all) andtimeout-minutes: 5to all 16 jobs. Fixed misleading[Help]comment onassign_staging.Test plan