🔍 Static Analysis Report - January 30, 2026 #12756
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-02-06T14:42:08.070Z. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Comprehensive static analysis completed on 145 agentic workflows using three security and code quality tools.
Scan Details:
Findings by Tool
Priority Issues
🔴 Critical: Poutine Error (1 workflow)
Issue:
if_always_true- Conditional expression always evaluates to trueAffected:
.github/workflows/dev-hawk.lock.ymlImpact: Workflow logic error that may cause incorrect execution flow
Action Required: Fix the conditional logic in the workflow
🟡 Medium: Zizmor Security Finding (1 workflow)
Issue:
artipacked- Credential persistence through GitHub Actions artifactsSeverity: Medium
Affected:
.github/workflows/hourly-ci-cleaner.lock.ymlReference: (docs.zizmor.sh/redacted)
Impact: Potential credential leakage through workflow artifacts
🟡 High Priority: Default Permissions on Risky Events (14 workflows)
Issue:
default_permissions_on_risky_events(Poutine warning)Severity: Warning
Affected Workflows: 14
Impact: Workflows triggered by risky events (issue_comment, pull_request_target) using default read-write permissions
View Affected Workflows
.github/workflows/ai-moderator.lock.yml.github/workflows/archie.lock.yml.github/workflows/brave.lock.yml.github/workflows/cloclo.lock.yml.github/workflows/grumpy-reviewer.lock.yml.github/workflows/mergefest.lock.yml.github/workflows/pdf-summary.lock.yml.github/workflows/plan.lock.yml.github/workflows/pr-nitpick-reviewer.lock.yml.github/workflows/q.lock.yml.github/workflows/scout.lock.yml.github/workflows/security-review.lock.yml.github/workflows/tidy.lock.yml.github/workflows/unbloat-docs.lock.ymlClustered Findings
Zizmor Security Findings
Obfuscation Details: Low severity warnings about obfuscated GitHub Actions features usage. Most findings relate to environment variable patterns that look unusual but are part of the standard workflow generation process.
Poutine Supply Chain Findings
Actionlint Linting Issues
SC2129 Analysis: Shellcheck suggests using
{ cmd1; cmd2; } >> fileinstead of individual redirects. This is a style suggestion affecting 144 workflows (all workflows that create prompts).SC1003 Analysis: Shellcheck info about single quote escaping in complex environment variable setup scripts. Affects 21 workflows with advanced shell configurations.
Historical Trends
Previous Scan: 2026-01-29
Total Findings Then: 304 issues
Total Findings Now: 579 issues
Change: +275 issues (+90.5%)
Analysis of Change
The significant increase in findings is primarily due to:
The core security issues remain stable:
Fix Suggestions
1. Fix Default Permissions on Risky Events (Priority: High)
Issue: 14 workflows using default permissions on risky events
Severity: Warning
Tool: Poutine
Automated Fix Prompt for Copilot Agent:
Recommendations
Immediate Actions (Critical/High Priority)
if_always_trueerror indev-hawk.lock.yml- Logic error that needs immediate attentionartipackedmedium severity inhourly-ci-cleaner.lock.yml- Potential credential leakageShort-term Actions (Medium Priority)
template-injectionlow severity finding inmcp-inspector.lock.ymlLong-term Actions (Low Priority/Informational)
Next Steps
if_always_trueerror in dev-hawk workflowartipackedissue in hourly-ci-cleaner workflowSummary Statistics
typist.lock.yml(21 issues)View Top 15 Most Affected Workflows
Analysis Notes
Tool Coverage:
False Positive Rate: The "obfuscation" warnings (126 occurrences) appear to be primarily related to standard workflow compilation patterns and may have a high false positive rate. These should be reviewed but are likely acceptable.
Real Security Concerns: The 14 workflows with default permissions on risky events represent genuine security risks that should be addressed promptly using the least-privilege principle.
References:
/tmp/gh-aw/compile-output.txt/tmp/gh-aw/cache-memory/security-scans/2026-01-30.json/tmp/gh-aw/cache-memory/fix-templates/Beta Was this translation helpful? Give feedback.
All reactions