🔒 Zizmor Security Analysis Report - 2025-11-02 #2988
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it was created by an agentic workflow more than 1 week ago. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
🔒 Zizmor Security Analysis Report - November 2, 2025
Executive Summary
Completed comprehensive security scan of 67 agentic workflow files using zizmor v1.16.2. The analysis identified 16 security findings across 3 distinct vulnerability types, affecting 8 workflows (12% of total workflows).
Key Findings:
Priority Action: Address the 3 High severity
dangerous-triggersfindings in ci-doctor, dev-hawk, and smoke-detector workflows by adding branch restrictions to workflow_run triggers.Full Report Details
Security Scan Statistics
Findings by Severity
Clustered Findings by Issue Type
1. dangerous-triggers (High Severity)⚠️
Priority: URGENT
Affected Workflows:
ci-doctor- Monitors "Daily Perf Improver" and "Daily Test Coverage Improver" without branch restrictionsdev-hawk- Monitors "Dev" workflow with branch restriction tocopilot/*(partially mitigated)smoke-detector- Monitors 5 smoke test workflows without branch restrictionsIssue Details:
The
workflow_runtrigger is flagged as "almost always used insecurely". This trigger allows privilege escalation because:main)Example from ci-doctor.lock.yml (Lines 42-48):
2. template-injection (Low Severity)
Affected Workflows:
duplicate-code-detector- 11 instancesmcp-inspector- 11 instancessmoke-codex- 11 instancesIssue Details:
These workflows use GitHub Actions template expressions in potentially unsafe contexts. While rated Low severity, template injection can allow attackers to inject arbitrary code if user-controlled input flows into template expressions without sanitization.
3. artipacked (Medium Severity)
Affected Workflows:
daily-perf-improverdaily-test-improverIssue Details:
These workflows may persist credentials in GitHub Actions artifacts. Artifacts are accessible to anyone with read access to the repository, potentially exposing secrets or credentials stored in artifact files.
Detailed Fix Guidance
Priority 1: Fix dangerous-triggers (High Severity)
I've generated a comprehensive fix template for this issue. Here's the actionable fix prompt:
Fix Prompt for Copilot Agent
After (ci-doctor.md):
Files to Modify:
Testing:
After applying fixes:
gh aw compilezizmor .github/workflows/*.lock.ymlBeta Was this translation helpful? Give feedback.
All reactions