Skip to content

fix(ci): [OPS-723] prevent script injection in gitleaks workflow#22

Merged
yotamleo merged 1 commit intomasterfrom
fix/ops-723-prevent-ci-script-injection
Apr 7, 2026
Merged

fix(ci): [OPS-723] prevent script injection in gitleaks workflow#22
yotamleo merged 1 commit intomasterfrom
fix/ops-723-prevent-ci-script-injection

Conversation

@yotamleo
Copy link
Copy Markdown
Contributor

@yotamleo yotamleo commented Apr 1, 2026

Summary

  • Move ${{ }} expressions from run: block to env: block in gitleaks.yaml to prevent potential shell injection
  • Uses safe env-var pattern recommended by GitHub security guidelines
  • Defense-in-depth: while current values (event_name, SHAs, booleans) are not attacker-controllable, the env: pattern eliminates the class of vulnerability entirely

Test plan

  • Verify YAML is valid (checked locally)
  • Verify zero ${{ }} remain in any run: block (checked locally)
  • Gitleaks CI still runs correctly on this PR

Jira: https://knostic.atlassian.net/browse/OPS-723

🤖 Generated with Claude Code

Move ${{ }} expressions from run: block to env: block to prevent
potential shell injection. Uses safe env-var pattern recommended by
GitHub security guidelines.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@yotamleo yotamleo merged commit 67d71f0 into master Apr 7, 2026
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants