🔒 Zizmor Security Analysis Report - November 1, 2025 #2923
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it was created by an agentic workflow more than 1 week ago. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
🔒 Zizmor Security Analysis Report - November 1, 2025
This report presents findings from today's automated security scan of all agentic workflow files using the zizmor security scanner. The scan identified 115 security findings across 65 workflows, with the majority being High severity template injection vulnerabilities.
Executive Summary
The security posture remains stable compared to the previous scan on October 31, with 115 findings across 4 vulnerability types. The most critical issue is template injection affecting 27 workflows with 96 findings. This vulnerability allows potential code injection attacks through untrusted GitHub context variables. Immediate action is recommended for High severity findings.
Full Security Analysis Report
Security Scan Statistics
Severity Distribution
Clustered Findings by Issue Type
Top Priority Issues
1. Template Injection (HIGHEST PRIORITY)
Severity: High | Confidence: High | Count: 96 findings
Template injection is the most prevalent and dangerous vulnerability in our workflows. This occurs when untrusted input from GitHub context (like
github.actor,github.event.inputs.*, orneeds.*.outputs.*) is used directly in shell commands via template expansion${{ }}.Why This Matters:
Affected Workflows (27 total):
Reference: (redacted)/audits/#template-injection
2. Dangerous Triggers
Severity: High | Confidence: Medium | Count: 3 findings
The
workflow_runtrigger is fundamentally insecure because it runs workflows in the context of the base branch (oftenmain) even when triggered by untrusted PR code. This gives untrusted code access to secrets and elevated permissions.Affected Workflows:
Reference: (redacted)/audits/#dangerous-triggers
3. Excessive Permissions
Severity: Medium | Confidence: High | Count: 13 findings
Workflows requesting overly broad permissions violate the principle of least privilege. Many workflows have
writepermissions whenreadwould suffice, increasing the potential damage if compromised.Affected Workflows (8 total):
Reference: (redacted)/audits/#excessive-permissions
4. Artipacked
Severity: Medium | Confidence: Low | Count: 3 findings
Potential credential persistence through GitHub Actions artifacts. Artifacts may inadvertently contain sensitive data like GitHub tokens or credentials.
Affected Workflows:
Reference: (redacted)/audits/#artipacked
Detailed Fix Suggestions
Fix Template Injection (Priority 1)
Template injection is the most critical issue requiring immediate attention. The fix involves moving untrusted expressions from
(redacted) blocks to the(redacted) section.The Problem:
The Solution:
Why This Works:
Copilot Agent Prompt for Template Injection:
After (SAFE):
Priority Expressions to Fix:
github.actorgithub.event.inputs.*needs.*.outputs.*github.event.workflow_run.*github.event.head_commit.*Important Notes:
${{ }}), just move it to the env: sectionAffected Workflows (27 workflows total - see list above)
After fixing, recompile workflows with
gh aw compileand verify template-injection findings are resolved.Beta Was this translation helpful? Give feedback.
All reactions