You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/checks.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -264,8 +264,8 @@ logging github context and secrets, or use of potentially untrusted inputs in sc
264
264
The following patterns are checked:
265
265
266
266
Untrusted Code Checkout: This is the misuse of potentially dangerous triggers.
267
-
This checks if a `pull_request_target` workflow trigger was used in conjunction
268
-
with an explicit pull request checkout. Workflows triggered with `pull_request_target`
267
+
This checks if a `pull_request_target`or `workflow_run`workflow trigger was used in conjunction
268
+
with an explicit pull request checkout. Workflows triggered with `pull_request_target` / `workflow_run`
269
269
have write permission to the target repository and access to target repository
270
270
secrets. With the PR checkout, PR authors may compromise the repository, for
271
271
example, by using build scripts controlled by the author of the PR or reading
@@ -606,8 +606,10 @@ possible.
606
606
Risk: `Critical` (service possibly accessible to third parties)
607
607
608
608
This check determines whether the webhook defined in the repository has a token configured to authenticate the origins of requests.
609
+
609
610
610
611
**Remediation steps**
611
612
- Check whether your service supports token authentication.
612
613
- If there is support for token authentication, set the secret in the webhook configuration. See [Setting up a webhook](https://docs.github.com/en/developers/webhooks-and-events/webhooks/creating-webhooks#setting-up-a-webhook)
613
614
- If there is no support for token authentication, consider implementing it by following [these directions](https://docs.github.com/en/developers/webhooks-and-events/webhooks/securing-your-webhooks).
0 commit comments