Commit 79bc1ad
fix(ci): Prevent command injection in ci-metadata workflow
Move GitHub context interpolation into an environment variable to prevent
potential command injection attacks. The github.event.pull_request.head.sha
and other GitHub context data can contain arbitrary user input and should
not be directly interpolated into shell scripts.
References:
- Parent ticket: https://linear.app/getsentry/issue/VULN-1328
- Child ticket: https://linear.app/getsentry/issue/JS-1972
- https://docs.github.com/en/actions/learn-github-actions/security-hardening-for-github-actions#understanding-the-risk-of-script-injections
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>1 parent c167cf2 commit 79bc1ad
1 file changed
Lines changed: 3 additions & 1 deletion
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
51 | 51 | | |
52 | 52 | | |
53 | 53 | | |
| 54 | + | |
| 55 | + | |
54 | 56 | | |
55 | | - | |
| 57 | + | |
56 | 58 | | |
57 | 59 | | |
58 | 60 | | |
| |||
0 commit comments