Skip to content

thesubtlety/unlawful-bannister

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 

Repository files navigation

unlawful-bannister

Testing malicious GitHub actions

How things work

  • Workflows are defined in the repo path .github/workflows/*
  • Can be started by an event, on schedule, or manually
  • Can reference workflows from other workflows, can reuse secrets in those with: secrets: inherit
  • Some events can be dangerous
    • if action executes the code in the pull request (e.g. auto build [i.e. execute code] on event)
    • Likely okay if PR is treated as data
  • pull_request_target event gives the PR write access to repo and repo secrets
  • Actions get a GITHUB_TOKEN with default read to the repo contents and metadata (can be changed) and nothing else. This token lasts for an hour
  • Activity occurs on Github infrastructure

Reference

About

Malicious GitHub Actions testing

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published