Skip to content

Commit

Permalink
feat: github.ref_name is always an injection risk (#67)
Browse files Browse the repository at this point in the history
  • Loading branch information
woodruffw authored Oct 28, 2024
1 parent 32a28f7 commit 704fcdd
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion src/audit/template_injection.rs
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,7 @@ impl TemplateInjection {
} else if context.starts_with("env.") {
// Almost never exploitable.
bad_expressions.push((context.into(), Severity::Low, Confidence::High));
} else if context.starts_with("github.event.") {
} else if context.starts_with("github.event.") || context == "github.ref_name" {
// TODO: Filter these more finely; not everything in the event
// context is actually attacker-controllable.
bad_expressions.push((context.into(), Severity::High, Confidence::High));
Expand Down

0 comments on commit 704fcdd

Please sign in to comment.