🔍 Static Analysis Report - January 13, 2026 #9836
Replies: 1 comment 1 reply
-
|
/plan |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Daily static analysis scan completed using three tools: zizmor (security), poutine (supply chain), and actionlint (linting).
Findings by Tool
🚨 Top Priority Issues
1. Unverified Script Execution (zizmor) - MEDIUM SEVERITY
unverified_script_execDescription: Workflows download and execute scripts from remote sources without integrity verification.
Example:
curl -sSL https://raw.githubusercontent.com/githubnext/gh-aw-firewall/main/install.sh | sudo AWF_VERSION=v0.8.2 bashImpact:
Top Affected Workflows:
2. Template Injection Warnings (actionlint) - INFORMATIONAL
template-injectionDescription: Potential code injection via template expansion in workflow steps.
Impact: These are informational warnings that flag potential code injection risks in template expansions. Most appear to be false positives in "Stop MCP gateway" steps.
3. Shellcheck SC2155 (actionlint) - WARNING
SC2155Description: Variables are declared and assigned in a single line with command substitution, masking return values.
Example:
Impact: Hides command failures because
localalways returns 0, making error handling impossible.4. Expression Errors (actionlint) - ERROR
expressionTypes:
activationproperty (3 occurrences)github.ownerinstead ofgithub.repository_owner(3 occurrences)assign_to_useroutput (1 occurrence)Affected Workflows:
📊 Historical Trends
Comparing with yesterday's scan (2026-01-12):
Analysis
The significant increase in findings is primarily due to:
New zizmor detection: The
unverified_script_execrule (120 findings) was not present in yesterday's scan, which only reportedtemplate-injectionwarnings. This is a NEW security finding that needs immediate attention.Actionlint expansion: The shellcheck integration now captures more issues (195 SC2155 warnings), plus the template-injection warnings moved from zizmor to actionlint.
One new workflow: Added workflow contributes to the total count.
Key Changes
New Issues Detected:
Consistent Issues:
🔧 Fix Suggestion: Unverified Script Execution
Issue: Unverified Script Execution (zizmor)
Severity: Medium
Affected Workflows: 120 occurrences across 118 workflows
Priority: HIGH - Security vulnerability
Current Problem
All workflows use this insecure pattern:
curl -sSL https://raw.githubusercontent.com/githubnext/gh-aw-firewall/main/install.sh | sudo AWF_VERSION=v0.8.2 bashRecommended Fix
Replace with secure download-verify-execute pattern:
Implementation Steps
📋 Detailed Findings by Issue Type
Zizmor Security Findings
Unverified Script Execution
Total: 120 occurrences across 118 workflows
Actionlint Findings
Template Injection Warnings (117)
Present in "Stop MCP gateway" steps across 117 workflows. These are informational warnings about potential code injection risks.
Shellcheck SC2155 Warnings (195)
Present across all 119 workflows in shell scripts that combine variable declaration with command substitution.
Expression Errors (8)
🎯 Recommendations
Immediate Actions (This Week)
✅ Fix Unverified Script Execution (Medium Severity)
✅ Fix Expression Errors (Error Severity)
Short-term Actions (This Month)
Address Shellcheck SC2155 (Warning)
Review Template Injection Warnings (Informational)
Long-term Actions (This Quarter)
Integrate Static Analysis in CI/CD
Update Workflow Templates
Establish Security Baseline
📚 Fix Templates Available
Detailed fix templates have been created in cache memory:
/tmp/gh-aw/cache-memory/fix-templates/zizmor-unverified_script_exec.md/tmp/gh-aw/cache-memory/fix-templates/actionlint-shellcheck-SC2155.md/tmp/gh-aw/cache-memory/fix-templates/actionlint-expression-errors.mdEach template includes:
🔗 References
✅ Next Steps
Beta Was this translation helpful? Give feedback.
All reactions