🔒 Zizmor Security Analysis Report - 2025-11-01 #2932
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it was created by an agentic workflow more than 1 week ago. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
🔒 Zizmor Security Analysis Report - 2025-11-01
This report presents the results of a comprehensive security scan of all agentic workflows using the zizmor security scanner. The scan identified 57 security findings across 4 vulnerability types affecting 10 workflows.
Executive Summary
**Security Scan (redacted)
**Key (redacted)
Security Findings by Type
Priority Issues
1. Template Injection (Most Common)
Impact: Template injection vulnerabilities occur when GitHub Actions expressions are used in contexts where they can be controlled by external input (e.g., issue titles, PR descriptions). While marked as Low severity, these can potentially allow attackers to inject malicious code into workflow execution.
2. Excessive Permissions (Most Widespread)
Impact: Workflows using
permissions: read-allviolate the principle of least privilege. If these workflows are compromised, attackers gain broad access to repository resources, increasing the potential damage.3. Dangerous Triggers (Highest Severity)
Impact: The
workflow_runtrigger is considered insecure because it runs with elevated privileges from the default branch, even when triggered by pull requests from forks. This can be exploited to gain unauthorized access or execute malicious code.4. Artipacked (Credential Leakage Risk)
Impact: Workflows may inadvertently persist credentials in artifacts, making them accessible to users with read access to the repository.
Fix Suggestion for Excessive Permissions
Since excessive-permissions is the most widespread issue affecting 8 workflows, here's a detailed fix template:
Issue: excessive-permissions (overly broad permissions)
Severity: Medium to High
Affected Workflows: 8 workflows
Reference: (redacted)/audits/#excessive-permissions
Problem
Workflows use
permissions: read-allwhich grants unnecessary broad access to repository resources. This violates the principle of least privilege and increases security risk if the workflow is compromised.Required Fix
Replace blanket permissions with specific, minimal permissions that the workflow actually needs.
Fix Steps
permissions: read-allwith specific permissionsExample Fix
**(redacted)
**(redacted)
Common Permission Mappings
contents: readcontents: writeissues: writepull-requests: writeissues: read,pull-requests: readCopilot Agent Fix Prompt
After:
Common Permission Mappings:
contents: readcontents: writeissues: writepull-requests: writeissues: read,pull-requests: readPlease apply this fix to the following affected workflows:
For each workflow:
Beta Was this translation helpful? Give feedback.
All reactions