Merge pull request #18705 from github/dbartol/actions-suite-selectors

Use default query selectors for Actions suites
This commit is contained in:
Dave Bartolomeo
2025-02-07 14:06:00 -05:00
committed by GitHub
9 changed files with 38 additions and 21 deletions

View File

@@ -2,9 +2,9 @@
* @name PATH Enviroment Variable built from user-controlled sources * @name PATH Enviroment Variable built from user-controlled sources
* @description Building the PATH environment variable from user-controlled sources may alter the execution of following system commands * @description Building the PATH environment variable from user-controlled sources may alter the execution of following system commands
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity error
* @security-severity 5.0 * @security-severity 5.0
* @precision high * @precision medium
* @id actions/envpath-injection/medium * @id actions/envpath-injection/medium
* @tags actions * @tags actions
* security * security

View File

@@ -2,9 +2,9 @@
* @name Enviroment Variable built from user-controlled sources * @name Enviroment Variable built from user-controlled sources
* @description Building an environment variable from user-controlled sources may alter the execution of following system commands * @description Building an environment variable from user-controlled sources may alter the execution of following system commands
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity error
* @security-severity 5.0 * @security-severity 5.0
* @precision high * @precision medium
* @id actions/envvar-injection/medium * @id actions/envvar-injection/medium
* @tags actions * @tags actions
* security * security

View File

@@ -3,11 +3,12 @@
* @description Workflows should contain permissions to provide a clear understanding has permissions to run the workflow. * @description Workflows should contain permissions to provide a clear understanding has permissions to run the workflow.
* @kind problem * @kind problem
* @security-severity 5.0 * @security-severity 5.0
* @problem.severity recommendation * @problem.severity warning
* @precision high * @precision high
* @id actions/missing-workflow-permissions * @id actions/missing-workflow-permissions
* @tags actions * @tags actions
* maintainability * maintainability
* security
* external/cwe/cwe-275 * external/cwe/cwe-275
*/ */

View File

@@ -2,7 +2,8 @@
* @name Excessive Secrets Exposure * @name Excessive Secrets Exposure
* @description All organization and repository secrets are passed to the workflow runner. * @description All organization and repository secrets are passed to the workflow runner.
* @kind problem * @kind problem
* @problem.severity recommendation * @precision high
* @problem.severity warning
* @id actions/excessive-secrets-exposure * @id actions/excessive-secrets-exposure
* @tags actions * @tags actions
* security * security

View File

@@ -2,8 +2,8 @@
* @name Artifact poisoning * @name Artifact poisoning
* @description An attacker may be able to poison the workflow's artifacts and influence on consequent steps. * @description An attacker may be able to poison the workflow's artifacts and influence on consequent steps.
* @kind path-problem * @kind path-problem
* @problem.severity warning * @problem.severity error
* @precision high * @precision medium
* @security-severity 5.0 * @security-severity 5.0
* @id actions/artifact-poisoning/medium * @id actions/artifact-poisoning/medium
* @tags actions * @tags actions

View File

@@ -3,8 +3,8 @@
* @description Using a tag for a non-immutable Action that is not pinned to a commit can lead to executing an untrusted Action through a supply chain attack. * @description Using a tag for a non-immutable Action that is not pinned to a commit can lead to executing an untrusted Action through a supply chain attack.
* @kind problem * @kind problem
* @security-severity 5.0 * @security-severity 5.0
* @problem.severity recommendation * @problem.severity warning
* @precision high * @precision medium
* @id actions/unpinned-tag * @id actions/unpinned-tag
* @tags security * @tags security
* actions * actions

View File

@@ -0,0 +1,20 @@
---
category: breaking
---
* The following queries have been removed from the `code-scanning` and `security-extended` suites.
Any existing alerts for these queries will be closed automatically.
* `actions/if-expression-always-true/critical`
* `actions/if-expression-always-true/high`
* `actions/unnecessary-use-of-advanced-config`
* The following query has been moved from the `code-scanning` suite to the `security-extended`
suite. Any existing alerts for this query will be closed automatically unless the analysis is
configured to use the `security-extended` suite.
* `actions/unpinned-tag`
* The following queries have been added to the `security-extended` suite.
* `actions/unversioned-immutable-action`
* `actions/envpath-injection/medium`
* `actions/envvar-injection/medium`
* `actions/code-injection/medium`
* `actions/artifact-poisoning/medium`
* `actions/untrusted-checkout/medium`

View File

@@ -1,11 +1,4 @@
- description: Standard Code Scanning queries for GitHub Actions - description: Standard Code Scanning queries for GitHub Actions
- queries: '.' - queries: .
- include: - apply: code-scanning-selectors.yml
problem.severity: from: codeql/suite-helpers
- error
- recommendation
- exclude:
tags contain:
- experimental
- debug
- internal

View File

@@ -1,2 +1,4 @@
- description: Security-extended queries for GitHub Actions - description: Security-extended queries for GitHub Actions
- import: codeql-suites/actions-code-scanning.qls - queries: .
- apply: security-extended-selectors.yml
from: codeql/suite-helpers