Skip to content

Conversation

@sayo-ep
Copy link
Contributor

@sayo-ep sayo-ep commented Oct 29, 2025

Pin luizm/action-sh-checker from @master to @v0.9.0 to prevent
automatic execution of potentially malicious upstream commits. Using
a mutable branch reference like @master creates a supply chain attack
vector where any new code pushed upstream would run in our CI without
review.

Additionally, add contents: read permission to the shell job following
the principle of least privilege. This restricts the workflow to only
the permissions it needs to checkout and lint shell scripts.

Changes:

  • Pin luizm/action-sh-checker to v0.9.0 (vetted release)
  • Add explicit permissions: contents: read to shell job
  • Preserve all existing functionality (shfmt, shellcheck options)

  Pin luizm/action-sh-checker from @master to @v0.9.0 to prevent
  automatic execution of potentially malicious upstream commits. Using
  a mutable branch reference like @master creates a supply chain attack
  vector where any new code pushed upstream would run in our CI without
  review.

  Additionally, add contents: read permission to the shell job following
  the principle of least privilege. This restricts the workflow to only
  the permissions it needs to checkout and lint shell scripts.

  Changes:
  - Pin luizm/action-sh-checker to v0.9.0 (vetted release)
  - Add explicit permissions: contents: read to shell job
  - Preserve all existing functionality (shfmt, shellcheck options)
@sayo-ep sayo-ep requested review from a team as code owners October 29, 2025 17:21
@sayo-ep sayo-ep merged commit b3ab4f2 into master Oct 29, 2025
17 checks passed
@sayo-ep sayo-ep deleted the luizm-action-sh-checker-review branch October 29, 2025 18:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants