Skip to content

TEST: verify security fix for shell injection [E-1815]#1

Closed
jonathansantilli wants to merge 1 commit intomainfrom
action/E-1815
Closed

TEST: verify security fix for shell injection [E-1815]#1
jonathansantilli wants to merge 1 commit intomainfrom
action/E-1815

Conversation

@jonathansantilli
Copy link
Copy Markdown
Owner

Internal test PR to verify the security fix works with real API tokens.

This PR runs the same workflows as the upstream PR (mobb-dev#29) but
within the fork where secrets are available.

The upstream PR: mobb-dev#29

Security fix for command injection vulnerability (CWE-78) in both
action.yml and review/action.yml.

Changes:
- Remove eval — replace with bash array execution for safe invocation
- Move all ${{ inputs.* }} from run: blocks to env: blocks to prevent
  shell injection via attacker-controlled values
- Remove debug echo that printed API tokens and github-token to logs
- Replace bash -l {0} (login shell) with bash (standard shell)
- Quote all variable expansions to prevent word splitting
- Pin all action references to immutable commit SHAs:
  - actions/setup-node v3.6.0 -> v4.4.0 (SHA pinned)
  - actions/checkout v3 -> v4.3.1 (SHA pinned)
  - actions/upload-artifact v4 -> v4.6.2 (SHA pinned)
  - actions/download-artifact v4 -> v8.0.1 (SHA pinned)
  - Sibz/github-status-action v1 (SHA pinned)

The action interface (inputs/outputs) is unchanged — this fix is
transparent to consumers.

Ref: E-1815
@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 7, 2026

image No security issues were found ✅

Awesome! No vulnerabilities were found by CodeQL in the changes made as part of this PR.
Please notice there are issues in this repo that are unrelated to this PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant