ppkarwasz commented on PR #344:
URL: https://github.com/apache/logging-parent/pull/344#issuecomment-2710079948

   > @ppkarwasz, can you explain the hardening practiced by replacing 
`input.foo` statements with shell environment variables?
   
   This follows the [Security Hardening for GitHub 
Actions](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#good-practices-for-mitigating-script-injection-attacks)
 guide.
   
   Let assume the `inputs.foo` contains untrusted data, for example `3.0.0"; 
echo Hello world!`. Then:
   
   ```
   export version="${{ inputs.foo }}"
   ```
   
   will execute the `echo` command.
   
   As noted before the problem currently does not exist, since the inputs are 
either hard coded or come from trusted sources, but removing those potential 
problems is very cheap. I am sure that CodeQL will at some point mark issue 
warnings for those step definitions.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@logging.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to