-
-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
direct use of branches #59
Comments
Thanks for the issue. Yeah, I'm trying to strike a balance on flagging branches -- using a "version" branch is so common that flagging it will lower the S/N ratio too much, but OTOH there are branches that people should almost never use (like master and main). #1 contains an audit idea for the latter. |
Cool. Besides guessing conventional branch names, I think another approach could be to scrape all actions in the build marketplace1, recording details in a database, such as branches, tags, any force-push activity, etc. What do you think? Footnotes |
I think that's a good idea, but probably out of scope for this tool -- managing datasets/behavioral trends fits better into trying to supply open source security intelligence, rather than pointing out individual fixable problems in a user's workflows. OTOH, the baseline audit here is a good idea: we can use the GitHub API to get the repo's default branch, and then flag a finding if a |
Something to consider in this balance is that GitHub explicitly recommends against referencing balances or tags for third party actions: It would be helpful if you could allow it on actions from specific orgs, and then not allow it from all other orgs. For example, in the repos I work in I would allow it for |
FWIW, you can accomplish this by checking the results of the (I've thought about making this more configurable e.g. allowing the config file to include per-audit sections, but there's a lot of design space there.) |
This has been implemented in the |
I'll give that a go, but one argument for supporting distinguishing third party vs first/second party actions, is that it's an explicit recommendation from GitHub. |
While I think the direct use of branches may be vulnerable:
And this type of code is quite common.
The text was updated successfully, but these errors were encountered: