Skip to content

fix(ci): [OPS-723] prevent script injection in gitleaks workflow#16

Merged
yotamleo merged 1 commit intomainfrom
fix/ops-723-prevent-ci-script-injection
Apr 7, 2026
Merged

fix(ci): [OPS-723] prevent script injection in gitleaks workflow#16
yotamleo merged 1 commit intomainfrom
fix/ops-723-prevent-ci-script-injection

Conversation

@yotamleo
Copy link
Copy Markdown
Contributor

@yotamleo yotamleo commented Apr 1, 2026

Summary

  • Move ${{ }} expressions from run: block to env: block in gitleaks.yaml to prevent potential shell injection
  • Uses safe env-var pattern recommended by GitHub security guidelines
  • Defense-in-depth: while current values (event_name, SHAs, booleans) are not attacker-controllable, the env: pattern eliminates the class of vulnerability entirely

Test plan

  • Verify YAML is valid (checked locally)
  • Verify zero ${{ }} remain in any run: block (checked locally)
  • Gitleaks CI still runs correctly on this PR

Jira: https://knostic.atlassian.net/browse/OPS-723

🤖 Generated with Claude Code

Move ${{ }} expressions from run: block to env: block to prevent
potential shell injection. Uses safe env-var pattern recommended by
GitHub security guidelines.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@yotamleo yotamleo merged commit fae23f6 into main Apr 7, 2026
5 checks passed
@yotamleo yotamleo deleted the fix/ops-723-prevent-ci-script-injection branch April 7, 2026 09:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants