mirror of
https://github.com/docker-mailserver/docker-mailserver.git
synced 2024-01-19 02:48:50 +00:00
bdb770a0aa
The prepare workflow runs in an untrusted context already and thus should not have anything worthwhile to exploit. However care should still be taken to avoid interpolating expressions into shell scripts directly that is data a user can control the value of. Especially to avoid any maintainer referencing an existing workflow from copying a risky snippet unaware of different security contexts for workflows. In this case, as per Github Documentation and referenced issue comment, the PR title is user controllable data, which if directly interpolated into the shell script being run (as it previously was), allows for injecting commands to execute. |
||
---|---|---|
.. | ||
scripts/docs | ||
contributors.yml | ||
default_on_push.yml | ||
docs-preview-deploy.yml | ||
docs-preview-prepare.yml | ||
docs-production-deploy.yml | ||
handle_stalled.yml | ||
linting.yml | ||
scheduled_builds.yml | ||
test_merge_requests.yml |