Commit graph

5 commits

Author SHA1 Message Date
dependabot[bot]
38f8f2b292
chore(deps): bump dorny/paths-filter from 3 to 4 (#1503)
Some checks failed
CodeQL Advanced / Analyze (actions) (push) Failing after 3s
CodeQL Advanced / Analyze (python) (push) Failing after 2s
Test / Run Python Tests (push) Successful in 3m4s
CodeQL Advanced / Analyze (javascript-typescript) (push) Failing after 3s
Pre-commit / pre-commit (push) Failing after 25s
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: bytecii <994513625@qq.com>
2026-03-18 12:48:05 -07:00
Salman Chishti
582ad9ed38
Upgrade GitHub Actions for Node 24 compatibility (#1079)
Signed-off-by: Salman Muin Kayser Chishti <13schishti@gmail.com>
Co-authored-by: Wendong-Fan <133094783+Wendong-Fan@users.noreply.github.com>
2026-02-02 00:57:26 +08:00
Wendong-Fan
9446f8aa89 cicd security 2026-01-13 21:55:29 +08:00
Cole Murray
102a864d43 fix(security): prevent arbitrary code execution in CI workflow
SECURITY FIX: The previous CI workflow was vulnerable to arbitrary code
execution from fork PRs due to using `pull_request_target` with checkout
of untrusted PR code.

Attack vector:
- Attacker forks repo and adds malicious node_modules/.bin/markdownlint-cli
- Opens PR to trigger CI workflow
- npx executes attacker's script with repository write permissions
- Attacker can exfiltrate credentials, comment on PRs, or push code

Fix:
- Split workflow into two separate files
- ci.yml: Uses pull_request_target for commenting (no code checkout)
- lint-markdown.yml: Uses pull_request for linting (safe to checkout)

The pull_request trigger runs fork PRs with read-only permissions and
no access to repository secrets, making it safe to checkout and execute
PR code.

Additional improvements:
- Updated actions to latest versions (checkout@v4, github-script@v7, paths-filter@v3)
- Pin markdownlint-cli version to prevent supply chain attacks
- Added security comments explaining the rationale

Reference: https://securitylab.github.com/research/github-actions-preventing-pwn-requests/
2026-01-12 23:10:48 -08:00
puzhen
723df5a03e Initial commit of eigent-main 2025-08-12 01:16:39 +02:00