🔍 Static Analysis Report - November 3, 2025 #3058
Closed
Replies: 2 comments 1 reply
-
|
/plan |
Beta Was this translation helpful? Give feedback.
1 reply
-
|
This discussion was automatically closed because it was created by an agentic workflow more than 1 week ago. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
🔍 Static Analysis Report - November 3, 2025
Analysis Summary
Comprehensive static analysis of all agentic workflows using three security and code quality tools: zizmor (security scanner), poutine (supply chain security), and actionlint (linting).
Findings by Tool
Top Priority Issues
1. Unquoted Variables (SC2086) - 1,420 occurrences
Description: Variables like
$GH_AW_PROMPT,$GITHUB_STEP_SUMMARY, and others are used without double quotes, which can lead to unexpected behavior if the variable contains spaces or special characters.2. Multiple Redirect Operations (SC2129) - 102 occurrences
Description: Multiple redirect operations to the same file should be grouped using
{ cmd1; cmd2; } >> fileinstead of individual redirects.3. Unquoted Command Substitution (SC2046) - 67 occurrences
Description: Command substitution
$(dirname "$GH_AW_PROMPT")should be quoted to prevent word splitting.4. Pull Requests on Self-Hosted Runners (pr_runs_on_self_hosted) - 35 occurrences
Description: Jobs that run on self-hosted runners (
ubuntu-slim) in workflows triggered by pull request events. This can be a security risk if PRs from forks can execute code on your infrastructure.5. Code Injection Risk (injection) - 2 occurrences
.github/workflows/create-branch.ymlDescription: User input from
github.event.inputs.nameis used in bash scripts without proper sanitization, creating injection vulnerability.6. Template Injection (template-injection) - 11 locations
Full Report Details
Detailed Findings by Tool
Zizmor Security Findings
Zizmor found 33 template injection risks across 11 workflow locations:
Affected workflows:
Poutine Supply Chain Security Findings
Poutine identified 83 supply chain security issues across 4 rule types:
Most Critical:
pr_runs_on_self_hosted(35 occurrences)Workflows using self-hosted runners with PR triggers:
Actionlint (Shellcheck) Linting Issues
Actionlint/Shellcheck found 1,620 shell scripting issues across 10 rule types:
All 67 workflows have actionlint findings, primarily related to unquoted variables and suboptimal shell scripting patterns.
Fix Suggestion: SC2086 - Unquoted Variables
Issue: The most common issue (1,420 occurrences) is unquoted variables in shell scripts, particularly
$GH_AW_PROMPTand$GITHUB_STEP_SUMMARY.Why it matters: While these specific variables are unlikely to contain spaces in practice, following shellcheck best practices improves code reliability and prevents potential bugs.
Recommended Fix:
Implementation Strategy:
Recommendations
Immediate Priority (Critical/High)
Short-term (Medium)
Long-term (Maintenance)
Historical Trends
This is the first automated static analysis scan. Future scans will track:
Next Steps
Scan Details:
Beta Was this translation helpful? Give feedback.
All reactions