-
Notifications
You must be signed in to change notification settings - Fork 230
Trigger Build #73
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trigger Build #73
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -1,28 +1,22 @@ | ||||||
| # .github/workflows/amplify.yml | ||||||
| name: Amplify Security # do not modify this line | ||||||
| --- | ||||||
| name: Amplify Security | ||||||
| on: | ||||||
| pull_request: {} # run for all PRs | ||||||
| workflow_dispatch: {} # allow manual runs through GitHub UI | ||||||
| pull_request: {} | ||||||
| workflow_dispatch: {} | ||||||
| push: | ||||||
| branches: ["master", "main"] # add additional iteration or release branch patterns here | ||||||
| branches: ["master", "main"] | ||||||
|
|
||||||
| permissions: | ||||||
| contents: read # declare default permissions for GITHUB_TOKEN | ||||||
| contents: read | ||||||
| id-token: write | ||||||
|
|
||||||
| jobs: | ||||||
| amplify-security-scan: | ||||||
| name: Amplify Security Scan | ||||||
| runs-on: ubuntu-latest | ||||||
| container: | ||||||
| image: returntocorp/semgrep | ||||||
| if: (github.actor != 'dependabot[bot]') | ||||||
| if: (!github.event.pull_request.head.repo.fork && github.actor != 'dependabot[bot]') | ||||||
| steps: | ||||||
| - uses: actions/checkout@v3 | ||||||
| - run: semgrep ci --config auto --json > amplify-sast.json || true | ||||||
| env: | ||||||
| SEMGREP_RULES: >- | ||||||
| p/security-audit | ||||||
| p/secrets | ||||||
| # do not modify this step | ||||||
| - uses: actions/upload-artifact@v3 | ||||||
| with: | ||||||
| name: amplify-scan | ||||||
| path: amplify-sast.json | ||||||
| retention-days: 7 | ||||||
| - name: Checkout | ||||||
| uses: actions/checkout@v4 | ||||||
| - name: Amplify Runner | ||||||
| uses: amplify-security/runner-action@main | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The issue identified by the Semgrep linter is that the GitHub action Here's a code suggestion to fix the issue by replacing
Suggested change
This comment was generated by an experimental AI tool. |
||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Static Code Analysis Risk: Software and Data Integrity Failures - GitHub actions artipacked vulnerability
Detected local filesystem git credential storage on GitHub Actions, as well as potential avenues for unintentional persistence of credentials in artifacts. By default, using
actions/checkoutcauses a credential to be persisted in the checked-out repo's.git/config, so that subsequent git operations can be authenticated. Subsequent steps may accidentally publicly persist.git/config, e.g. by including it in a publicly accessible artifact viaactions/upload-artifact. However, even without this, persisting the credential in the.git/configis non-ideal unless actually needed. To fix, addpersist-credentials: falseinside awithsection in this step.Severity: Medium⚠️
Status: Open 🔴
References:
Suggested reviewers 🧐: @confusedcrib
Take action by replying with an [arnica] command 💬
Actions
Use
[arnica]or[a]to interact with the Arnica bot to acknowledge or dismiss code risks.[arnica] ack <message>
Acknowledge the finding as a valid code risk.
Examples
[arnica] dismiss <
fp|accept|capacity> <message>Dismiss the risk with a reason.
fp: False positive, i.e. the result is incorrect and indicates no actual risk.accept: Tolerable risk, i.e. risk severity is lower than what has been reported or is accepted as it stands.capacity: No capacity, i.e. leave me alone, please.Examples