🔍 Static Analysis Report - November 16, 2025 #4121
Closed
Replies: 2 comments 1 reply
-
|
/plan |
Beta Was this translation helpful? Give feedback.
1 reply
-
|
This discussion was automatically closed because it was created by an agentic workflow more than 1 week ago. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
🔍 Static Analysis Report - November 16, 2025
Overview
Comprehensive static analysis scan completed on all 84 agentic workflow files using three security tools: zizmor (security scanner), poutine (supply chain security), and actionlint (workflow linter).
Key Findings Summary
Analysis Summary
Tools Used
Findings by Severity
Detailed Findings by Tool
🔴 Zizmor Security Findings
1. Dangerous Triggers (High Severity) - CRITICAL
Issue Type:
dangerous-triggersSeverity: High
Affected Workflows: 2
Reference: (redacted)#dangerous-triggers
Description: Use of the
workflow_runtrigger, which is fundamentally insecure. This trigger runs in the context of the default branch but receives information from potentially untrusted sources (e.g., pull requests from forks).Security Impact:
Priority: 🔴 CRITICAL - Fix immediately
2. Template Injection - High Severity (High Severity)
Issue Type:
template-injectionSeverity: High
Affected Workflows: 1
Reference: (redacted)#template-injection
Description: Code injection vulnerability via GitHub Actions template expansion. Untrusted data from GitHub context variables is being used in a way that could allow code injection.
Security Impact:
Priority: 🔴 HIGH - Fix soon
3. Template Injection - Low Severity (Low Severity)
Issue Type:
template-injectionSeverity: Low
Affected Workflows: 1
Reference: (redacted)#template-injection
Description: Low-risk template injection due to controlled context or limited exposure.
Security Impact: Limited injection risk due to controlled context
Priority: 🔵 LOW - Monitor
ℹ️ Poutine Supply Chain Findings
Outdated Actions
Issue Type:
outdated-actionsSeverity: Info
Affected Workflows: 2
Recommendation: Update action to use the latest commit SHA for security patches
Priority: ℹ️ INFO - Update when convenient
Missing Permissions
Issue Type:
missing-permissionsSeverity: Warning
Affected Workflows: 1
issues: read,pull-requests: readDescription: Workflow uses GitHub toolsets that require specific permissions, but these permissions are not declared in the workflow frontmatter.
Impact: May cause runtime failures or request excessive permissions
Priority:⚠️ WARNING - Fix to prevent runtime issues
Clustered Findings by Issue Type
By Tool
By Severity Distribution
Top Priority Issues
1. Dangerous Triggers in CI/CD Workflows
Workflows: ci-doctor, dev-hawk
Severity: 🔴 High
Count: 2 workflows
Impact: Critical security vulnerability
These workflows use
workflow_runtrigger which creates a security risk. The trigger executes in a privileged context but processes data from potentially untrusted sources.2. Template Injection in cloclo Workflow
Workflow: cloclo
Severity: 🔴 High
Count: 3 occurrences
Impact: Code injection risk
Multiple instances of unsafe template variable expansion that could allow attackers to inject malicious code.
Fix Recommendation: Dangerous Triggers
Issue: dangerous-triggers (workflow_run)
Severity: High
Affected Workflows: ci-doctor, dev-hawk
Priority: Immediate action required
Understanding the Vulnerability
The
workflow_runtrigger is flagged as insecure because:Recommended Fix Options
Option 1: Use Schedule Instead (Recommended)
Replace
workflow_runwith ascheduletrigger that periodically checks for completed workflows using the GitHub API:Advantages:
Option 2: Add Strict Validation (If workflow_run Must Be Used)
If you must keep
workflow_run, add comprehensive validation:Requirements:
github.event.workflow_run.*Implementation Steps
Full Detailed Findings by Workflow
Workflows with Security Issues
ci-doctor.md
Findings: 1
dangerous-triggers (High)
dev-hawk.md
Findings: 1
dangerous-triggers (High)
copilot/*), creating potential for malicious code execution from untrusted branchescloclo.md
Findings: 3
template-injection (High) - 3 occurrences
mcp-inspector.md
Findings: 1
template-injection (Low)
dev.md
Findings: 1 (Info)
outdated-actions
test-ollama-threat-detection.md
Findings: 1 (Info)
outdated-actions
docs-noob-tester.md
Findings: 1 (Warning)
missing-permissions
issues: read,pull-requests: readHistorical Trends
Comparing with previous scan (2025-11-15):
New Findings Since Last Scan:
Persistent Issues:
Resolved Issues:
Recommendations
Immediate Actions (Priority 1)
✅ Fix dangerous-triggers in ci-doctor and dev-hawk
workflow_runwithscheduletrigger✅ Fix template-injection in cloclo workflow
Short-term Actions (Priority 2)
issues: readandpull-requests: readto workflow frontmatterℹ️ Update outdated actions
Long-term Actions (Priority 3)
🔵 Monitor template-injection in mcp-inspector
📋 Establish automated static analysis
📚 Update workflow creation guidelines
Prevention Strategies
For Future Workflows
workflow_runtrigger: Useschedule,workflow_dispatch, orworkflow_callinsteadgithub.event.*without validationSecurity Best Practices
Next Steps
Cache Memory Updated
Analysis results stored in:
/tmp/gh-aw/cache-memory/security-scans/2025-11-16.json- Today's scan results/tmp/gh-aw/cache-memory/vulnerabilities/by-tool.json- Vulnerability patterns by tool/tmp/gh-aw/cache-memory/fix-templates/zizmor-dangerous-triggers.md- Fix template for dangerous triggersSummary
This comprehensive static analysis identified 6 security findings across 84 workflows, with 5 High-severity issues requiring immediate attention. The most critical finding is the use of
workflow_runtrigger in 2 workflows (ci-doctor, dev-hawk), which creates a significant security vulnerability. Additionally, 3 High-severity template injection issues were discovered in the cloclo workflow.Recommended immediate actions:
workflow_runtriggerBy addressing these findings, we can significantly improve the security posture of our agentic workflows and establish patterns for secure workflow development going forward.
Beta Was this translation helpful? Give feedback.
All reactions