Conversation
Fixes code scanning alert #10: Potentially unsafe quoting (go/unsafe-quoting) **Problem:** The code was using an escaped secret name in the GitHub Actions expression context (${{ secrets.%s }}), which is incorrect. The escapeSingleQuote() function escapes single quotes and backslashes for use in single-quoted YAML strings, but GitHub Actions expressions don't use single quotes. **Solution:** Use the original, unescaped secretName in the GitHub Actions expression since secret names are already validated to only contain safe characters (uppercase letters, numbers, and underscores) via the validateSecretReferences function. The escaped version is still used for the environment variable name prefix (SECRET_%s) where it's needed for YAML quoting. **Security Impact:** This fix prevents potential injection vulnerabilities where escaped characters could be misinterpreted in the GitHub Actions expression context. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
pelikhan
approved these changes
Oct 11, 2025
Contributor
Author
|
Agentic Changeset Generator triggered by this pull request |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Security Fix: Unsafe Quoting in Secret Redaction
Alert Number: #10
Severity: Critical (security_severity_level)
Rule:
go/unsafe-quotingFile:
pkg/workflow/redact_secrets.go:93Vulnerability Description
CodeQL identified a potentially unsafe quoting vulnerability in the secret redaction YAML generation code. The issue was on line 93 (previously line 91) where an escaped secret name was being used in a GitHub Actions expression context
${{ secrets.%s }}.The problem:
escapeSingleQuote()function escapes single quotes and backslashes for use in single-quoted YAML strings${{ ... }}) don't use single quotes and have their own syntax rulesFix Applied
Changed line 93 to use the original, unescaped
secretNamein the GitHub Actions expression:The fix is safe because:
validateSecretReferences()to match the pattern^[A-Z][A-Z0-9_]*$Security Best Practices
Testing Considerations
References
🤖 Generated with Claude Code