You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Daily static analysis scan of all agentic workflows using three security and code quality tools: zizmor (security), poutine (supply chain), and actionlint (linting with shellcheck).
Tools Used: zizmor, poutine, actionlint
Total Findings: 362
Workflows Scanned: 130
Workflows Affected: 131 (some workflows have multiple findings)
Findings by Tool
Tool
Total
Critical
High
Medium
Low
Info/Style
actionlint (linting)
217
0
0
15
0
202
poutine (supply chain)
128
0
128*
0
0
0
zizmor (security)
1
0
0
0
1
0
* Marked as high priority due to supply chain security implications, though poutine reports it as "note"
🚨 Priority Issue: Unverified Script Execution
Overview
Tool: Poutine Finding: unverified_script_exec Severity: Note (High Priority - Supply Chain Risk) Affected: 128 out of 130 workflows Impact: Remote script execution without integrity verification
The Issue
128 workflows execute a remote installation script without verification:
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Daily static analysis scan of all agentic workflows using three security and code quality tools: zizmor (security), poutine (supply chain), and actionlint (linting with shellcheck).
Findings by Tool
* Marked as high priority due to supply chain security implications, though poutine reports it as "note"
🚨 Priority Issue: Unverified Script Execution
Overview
Tool: Poutine
Finding: unverified_script_exec
Severity: Note (High Priority - Supply Chain Risk)
Affected: 128 out of 130 workflows
Impact: Remote script execution without integrity verification
The Issue
128 workflows execute a remote installation script without verification:
curl -sSL https://raw.githubusercontent.com/githubnext/gh-aw-firewall/main/install.sh | sudo AWF_VERSION=v0.10.0 bashWhy This Matters:
sudo(full system privileges)Recommended Fix
Add checksum verification before execution:
Action Items:
Full fix template available at:
/tmp/gh-aw/cache-memory/fix-templates/poutine-unverified-script-exec.mdClustered Findings by Tool
Actionlint (Shellcheck) Findings
Actionlint uses shellcheck to identify shell script issues in workflow
run:blocks.>>used multiple times)[ p -a q ]instead of[ p ] && [ q ]SC2129 Example (116 workflows)
Location: Prompt creation scripts
Current:
Better:
{ echo "line1" echo "line2" echo "line3" } >> filePriority: Low (style issue, no functional impact)
SC1003 Example (11 workflows)
Issue: Incorrect single quote escaping in heredocs or strings
Priority: Medium (affects code correctness)
SC2166 Example (15 workflows)
Current:
[ condition1 -a condition2 ]Better:
[ condition1 ] && [ condition2 ]Priority: Medium (portability and correctness)
Poutine (Supply Chain Security) Findings
All affected workflows: See detailed list in cache at
/tmp/gh-aw/cache-memory/security-scans/2026-01-19.jsonZizmor (Security) Findings
Location:
.github/workflows/mcp-inspector.lock.yml:434:9Reference: https://docs.zizmor.sh/audits/#template-injection
Priority: Medium (potential code injection vulnerability)
Findings by Workflow
Top 20 Affected Workflows (by finding count)
Most workflows have 1-2 findings. Common patterns:
Workflows with multiple issue types:
Historical Context
First Scan: This is the first comprehensive static analysis scan with all three tools.
Baseline Established:
Future Tracking: Scan data stored in
/tmp/gh-aw/cache-memory/security-scans/for trend analysis.Recommendations
Immediate (Security)
✅ Fix unverified script execution in 128 workflows
✅ Review template-injection in mcp-inspector.lock.yml
Short-term (Code Quality)
🔧 Fix SC2166 warnings (15 workflows)
-atest syntax🔧 Fix SC1003 issues (11 workflows)
Long-term (Process)
📋 Improve SC2129 style (116 workflows)
🔄 Establish continuous monitoring
📚 Update workflow templates
Scan Data Storage
All findings have been stored in persistent cache memory for historical tracking:
Next Steps
Priority 1: Address the unverified script execution finding
Priority 2: Fix medium-severity code quality issues
Priority 3: Process improvements
Scan Details:
/tmp/gh-aw/cache-memory/security-scans/2026-01-19.jsonBeta Was this translation helpful? Give feedback.
All reactions