Merge pull request #31 from GitHubSecurityLab/new_sinks

Add security sinks
This commit is contained in:
Jorge
2024-03-14 19:11:27 +01:00
committed by GitHub
103 changed files with 922 additions and 5 deletions

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["8398a7/action-slack", "*", "input.custom_payload", "code-injection"]

View File

@@ -3,4 +3,4 @@ extensions:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["actions/github-script","*","input.script","expression-injection"]
- ["actions/github-script", "*", "input.script", "code-injection"]

View File

@@ -4,3 +4,18 @@ extensions:
extensible: summaryModel
data:
- ["akhileshns/heroku-deploy", "*", "input.branch", "output.status", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["akhileshns/heroku-deploy", "*", "input.heroku_app_name", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.buildpack", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.region", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.stack", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.team", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.docker_heroku_process_type", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.docker_build_args", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.branch", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.appdir", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.heroku_api_key", "command-injection"]
- ["akhileshns/heroku-deploy", "*", "input.heroku_email", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sourceModel
data:
- ["amannn/action-semantic-pull-request", "*", "output.error_message", "pull_request_target", "PR title"]

View File

@@ -0,0 +1,10 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["anchore/sbom-action", "*", "input.syft-version", "command-injection"]
- ["anchore/sbom-action", "*", "input.format", "command-injection"]
- ["anchore/sbom-action", "*", "input.path", "command-injection"]
- ["anchore/sbom-action", "*", "input.file", "command-injection"]
- ["anchore/sbom-action", "*", "input.image", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["anchore/scan-action", "*", "input.grype-version", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["andresz1/size-limit-action", "*", "input.package_manager", "command-injection"]
- ["andresz1/size-limit-action", "*", "input.build_script", "command-injection"]
- ["andresz1/size-limit-action", "*", "input.script", "command-injection"]
- ["andresz1/size-limit-action", "*", "input.clean_script", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["asdf-vm/actions", "*", "input.before_install", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["axel-op/googlejavaformat-action", "*", "input.commitMessage", "command-injection"]
- ["axel-op/googlejavaformat-action", "*", "input.commit-message", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["azure/powershell", "*", "input.azPSVersion", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["bahmutov/npm-install", "*", "input.install-command", "command-injection"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["blackducksoftware/github-action", "*", "input.args", "command-injection"]
- ["blackducksoftware/github-action", "*", "input.blackduck.url", "command-injection"]
- ["blackducksoftware/github-action", "*", "input.blackduck.api.token", "command-injection"]

View File

@@ -4,3 +4,9 @@ extensions:
extensible: summaryModel
data:
- ["bufbuild/buf-breaking-action", "*", "input.buf_token", "env.BUF_TOKEN", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["bufbuild/buf-breaking-action", "*", "input.input", "command-injection"]
- ["bufbuild/buf-breaking-action", "*", "input.against", "command-injection"]

View File

@@ -4,3 +4,8 @@ extensions:
extensible: summaryModel
data:
- ["bufbuild/buf-lint-action", "*", "input.buf_token", "env.BUF_TOKEN", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["bufbuild/buf-lint-action", "*", "input.input", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["bufbuild/buf-setup-action", "*", "input.buf_domain", "command-injection"]
- ["bufbuild/buf-setup-action", "*", "input.buf_user", "command-injection"]

View File

@@ -4,3 +4,9 @@ extensions:
extensible: summaryModel
data:
- ["cachix/cachix-action", "*", "input.signingKey", "env.CACHIX_SIGNING_KEY", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["cachix/cachix-action", "*", "input.installCommand", "command-injection"]
- ["cachix/cachix-action", "*", "input.cachixBin", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["changesets/action", "*", "input.publish", "command-injection"]
- ["changesets/action", "*", "input.version", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["cloudflare/wrangler-action", "*", "input.preCommands", "command-injection"]
- ["cloudflare/wrangler-action", "*", "input.postCommands", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["crazy-max/ghaction-chocolatey", "*", "input.args", "command-injection"]

View File

@@ -3,4 +3,4 @@ extensions:
pack: githubsecuritylab/actions-all
extensible: summaryModel
data:
- ["crazy-max/ghaction-import-gpg", "*", "input.fingerprint", "output.fingerprint", "taint"]
- ["crazy-max/ghaction-import-gpg", "*", "input.fingerprint", "output.fingerprint", "taint"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["cycjimmy/semantic-release-action", "*", "input.semantic_version", "command-injection"]
- ["cycjimmy/semantic-release-action", "*", "input.extra_plugins", "command-injection"]
- ["cycjimmy/semantic-release-action", "*", "input.extends", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sourceModel
data:
- ["cypress-io/github-action", "*", "env.GH_BRANCH", "pull_request_target", "PR branch"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["dailydotdev/action-devcard", "*", "input.commit_branch", "sql-injection"]
- ["dailydotdev/action-devcard", "*", "input.commit_filename", "sql-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["danielpalme/reportgenerator-github-action", "*", "input.toolpath", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["daspn/private-actions-checkout", "*", "input.actions_list", "command-injection"]
- ["daspn/private-actions-checkout", "*", "input.checkout_base_path", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["dawidd6/action-ansible-playbook", "*", "input.playbook", "command-injection"]
- ["dawidd6/action-ansible-playbook", "*", "input.options", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sourceModel
data:
- ["dawidd6/action-download-artifact", "*", "output.artifacts", "*", "Artifact details"]

View File

@@ -3,4 +3,4 @@ extensions:
pack: githubsecuritylab/actions-all
extensible: summaryModel
data:
- ["delaguardo/setup-clojure", "*", "input.boot", "env.BOOT_VERSION", "taint"]
- ["delaguardo/setup-clojure", "*", "input.boot", "env.BOOT_VERSION", "taint"]

View File

@@ -0,0 +1,11 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["determinatesystems/magic-nix-cache-action", "*", "input.source-url", "command-injection"]
- ["determinatesystems/magic-nix-cache-action", "*", "input.source-tag", "command-injection"]
- ["determinatesystems/magic-nix-cache-action", "*", "input.source-pr", "command-injection"]
- ["determinatesystems/magic-nix-cache-action", "*", "input.source-branch", "command-injection"]
- ["determinatesystems/magic-nix-cache-action", "*", "input.source-revision", "command-injection"]
- ["determinatesystems/magic-nix-cache-action", "*", "input.source-binary", "command-injection"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["docker-practice/actions-setup-docker", "*", "input.docker_version", "command-injection"]
- ["docker-practice/actions-setup-docker", "*", "input.docker_channel", "command-injection"]
- ["docker-practice/actions-setup-docker", "*", "input.docker_daemon_json", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["docker/build-push-action", "*", "input.context", "code-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["endbug/latest-tag", "*", "input.ref", "command-injection"]
- ["endbug/latest-tag", "*", "input.tag-name", "command-injection"]
- ["endbug/latest-tag", "*", "input.git-directory", "command-injection"]
- ["endbug/latest-tag", "*", "input.description", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["expo/expo-github-action", "*", "input.command", "command-injection"]
- ["expo/expo-github-action", "*", "input.packager", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["firebaseextended/action-hosting-deploy", "*", "input.firebaseToolsVersion", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["gabrielbb/xvfb-action", "*", "input.run", "command-injection"]
- ["gabrielbb/xvfb-action", "*", "input.options", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["game-ci/unity-builder", "*", "input.cacheKey", "command-injection"]
- ["game-ci/unity-builder", "*", "input.unityHubVersionOnMac", "command-injection"]

View File

@@ -3,4 +3,4 @@ extensions:
pack: githubsecuritylab/actions-all
extensible: summaryModel
data:
- ["game-ci/unity-test-runner", "*", "input.artifactsPath", "output.artifactsPath", "taint"]
- ["game-ci/unity-test-runner", "*", "input.artifactsPath", "output.artifactsPath", "taint"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["gautamkrishnar/blog-post-workflow", "*", "input.item_exec", "code-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["go-semantic-release/action", "*", "input.bin", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["golangci/golangci-lint-action", "*", "input.version", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["gonuit/heroku-docker-deploy", "*", "input.email", "command-injection"]
- ["gonuit/heroku-docker-deploy", "*", "input.heroku_api_key", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["goreleaser/goreleaser-action", "*", "input.args", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["gr2m/create-or-update-pull-request-action", "*", "input.branch", "command-injection"]
- ["gr2m/create-or-update-pull-request-action", "*", "input.path", "command-injection"]
- ["gr2m/create-or-update-pull-request-action", "*", "input.commit-message", "command-injection"]
- ["gr2m/create-or-update-pull-request-action", "*", "input.author", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["ilammy/msvc-dev-cmd", "*", "input.vsversion", "command-injection"]
- ["ilammy/msvc-dev-cmd", "*", "input.arch", "command-injection"]
- ["ilammy/msvc-dev-cmd", "*", "input.sdk", "command-injection"]
- ["ilammy/msvc-dev-cmd", "*", "input.toolset", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["ilammy/setup-nasm", "*", "input.version", "command-injection"]
- ["ilammy/setup-nasm", "*", "input.destination", "command-injection"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["imjohnbo/issue-bot", "*", "input.body", "code-injection"]
- ["imjohnbo/issue-bot", "*", "input.linked-comments-previous-issue-text", "code-injection"]
- ["imjohnbo/issue-bot", "*", "input.linked-comments-new-issue-text", "code-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["iterative/setup-cml", "*", "input.version", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["iterative/setup-dvc", "*", "input.version", "command-injection"]

View File

@@ -0,0 +1,11 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["jamesives/github-pages-deploy-action", "*", "input.branch", "command-injection"]
- ["jamesives/github-pages-deploy-action", "*", "input.commit-message", "command-injection"]
- ["jamesives/github-pages-deploy-action", "*", "input.git-config-email", "command-injection"]
- ["jamesives/github-pages-deploy-action", "*", "input.git-config-name", "command-injection"]
- ["jamesives/github-pages-deploy-action", "*", "input.target-folder", "command-injection"]
- ["jamesives/github-pages-deploy-action", "*", "input.tag", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["johnnymorganz/stylua-action", "*", "input.args", "command-injection"]

View File

@@ -0,0 +1,11 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["jurplel/install-qt-action", "*", "input.version", "command-injection"]
- ["jurplel/install-qt-action", "*", "input.arch", "command-injection"]
- ["jurplel/install-qt-action", "*", "input.dir", "command-injection"]
- ["jurplel/install-qt-action", "*", "input.aqtversion", "command-injection"]
- ["jurplel/install-qt-action", "*", "input.py7zrversion", "command-injection"]
- ["jurplel/install-qt-action", "*", "input.extra", "command-injection"]

View File

@@ -4,3 +4,10 @@ extensions:
extensible: summaryModel
data:
- ["jwalton/gh-ecr-push", "*", "input.image", "output.imageUrl", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["jwalton/gh-ecr-push", "*", "input.image", "command-injection"]
- ["jwalton/gh-ecr-push", "*", "input.local-image", "command-injection"]
- ["jwalton/gh-ecr-push", "*", "input.region", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["leafo/gh-actions-lua", "*", "input.luaVersion", "command-injection"]
- ["leafo/gh-actions-lua", "*", "input.luaCompileFlags", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["leafo/gh-actions-luarocks", "*", "input.withLuaPath", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["lucasbento/auto-close-issues", "*", "input.issue-close-message", "code-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["magefile/mage-action", "*", "input.args", "command-injection"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["maierj/fastlane-action", "*", "input.lane", "command-injection"]
- ["maierj/fastlane-action", "*", "input.options", "command-injection"]
- ["maierj/fastlane-action", "*", "input.env", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["manusa/actions-setup-minikube", "*", "input.kubernetes_version", "command-injection"]
- ["manusa/actions-setup-minikube", "*", "input.driver", "command-injection"]
- ["manusa/actions-setup-minikube", "*", "input.container_runtime", "command-injection"]
- ["manusa/actions-setup-minikube", "*", "input.start_args", "command-injection"]

View File

@@ -5,3 +5,12 @@ extensions:
data:
- ["mattdavis0351/actions", "*", "input.image-name", "output.imageUrl", "taint"]
- ["mattdavis0351/actions", "*", "input.tag", "output.imageUrl", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["mattdavis0351/actions", "*", "input.repo-token", "command-injection"]
- ["mattdavis0351/actions", "*", "input.dockerfile-location", "command-injection"]
- ["mattdavis0351/actions", "*", "input.image-name", "command-injection"]
- ["mattdavis0351/actions", "*", "input.dockerfile-name", "command-injection"]
- ["mattdavis0351/actions", "*", "input.tag", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["meteorengineer/setup-meteor", "*", "input.meteor-release", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["microsoft/setup-msbuild", "*", "input.vs-version", "command-injection"]
- ["microsoft/setup-msbuild", "*", "input.vswhere-path", "command-injection"]

View File

@@ -0,0 +1,16 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["mr-smithers-excellent/docker-build-push", "*", "input.tags", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.buildArgs", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.labels", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.target", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.directory", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.platform", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.image", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.registry", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.dockerfile", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.githubOrg", "command-injection"]
- ["mr-smithers-excellent/docker-build-push", "*", "input.username", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["msys2/setup-msys2", "*", "input.install", "command-injection"]
- ["msys2/setup-msys2", "*", "input.pacboy", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["mxschmitt/action-tmate", "*", "input.tmate-server-rsa-fingerprint", "command-injection"]
- ["mxschmitt/action-tmate", "*", "input.tmate-server-ed25519-fingerprint", "command-injection"]

View File

@@ -4,3 +4,9 @@ extensions:
extensible: summaryModel
data:
- ["mymindstorm/setup-emsdk", "*", "input.actions-cache-folder", "env.EMSDK", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["mymindstorm/setup-emsdk", "*", "input.actions-cache-folder", "command-injection"]
- ["mymindstorm/setup-emsdk", "*", "input.version", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["nanasess/setup-chromedriver", "*", "input.chromedriver-version", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["nanasess/setup-php", "*", "input.php-version", "command-injection"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["nick-fields/retry", "*", "input.on_retry_command", "command-injection"]
- ["nick-fields/retry", "*", "input.new_command_on_retry", "command-injection"]
- ["nick-fields/retry", "*", "input.command", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["octokit/graphql-action", "*", "input.query", "request-forgery"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["octokit/request-action", "*", "input.route", "request-forgery"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["olafurpg/setup-scala", "*", "input.jabba-version", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["paambaati/codeclimate-action", "*", "input.coverageCommand", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["peter-evans/create-pull-request", "*", "input.branch", "command-injection"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["plasmicapp/plasmic-action", "*", "input.project_id", "command-injection"]
- ["plasmicapp/plasmic-action", "*", "input.project_api_token", "command-injection"]
- ["plasmicapp/plasmic-action", "*", "input.branch", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["preactjs/compressed-size-action", "*", "input.build-script", "command-injection"]
- ["preactjs/compressed-size-action", "*", "input.clean-script", "command-injection"]

View File

@@ -0,0 +1,12 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["py-actions/flake8", "*", "input.flake8-version", "command-injection"]
- ["py-actions/flake8", "*", "input.plugins", "command-injection"]
- ["py-actions/flake8", "*", "input.path", "command-injection"]
- ["py-actions/flake8", "*", "input.ignore", "command-injection"]
- ["py-actions/flake8", "*", "input.exclude", "command-injection"]
- ["py-actions/flake8", "*", "input.max-line-length", "command-injection"]
- ["py-actions/flake8", "*", "input.args", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["py-actions/py-dependency-install", "*", "input.path", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["pyo3/maturin-action", "*", "input.before-script-linux", "command-injection"]
- ["pyo3/maturin-action", "*", "input.target", "command-injection"]
- ["pyo3/maturin-action", "*", "input.command", "command-injection"]
- ["pyo3/maturin-action", "*", "input.manylinux", "command-injection"]

View File

@@ -0,0 +1,24 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["reactivecircus/android-emulator-runner", "*", "input.api-level", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.target", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.arch", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.profile", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.sdcard-path-or-size'", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.cores", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.ram-size", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.heap-size", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.disk-size", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.emulator-options", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.emulator-build", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.ndk", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.cmake", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.ndk", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.ndk", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.ndk", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.ndk", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.ndk", "command-injection"]
- ["reactivecircus/android-emulator-runner", "*", "input.ndk", "command-injection"]

View File

@@ -0,0 +1,13 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["reggionick/s3-deploy", "*", "input.bucket", "command-injection"]
- ["reggionick/s3-deploy", "*", "input.bucket-region", "command-injection"]
- ["reggionick/s3-deploy", "*", "input.dist-id", "command-injection"]
- ["reggionick/s3-deploy", "*", "input.invalidation", "command-injection"]
- ["reggionick/s3-deploy", "*", "input.delete-removed", "command-injection"]
- ["reggionick/s3-deploy", "*", "input.cacheControl", "command-injection"]
- ["reggionick/s3-deploy", "*", "input.cache", "command-injection"]
- ["reggionick/s3-deploy", "*", "input.files-to-include", "command-injection"]

View File

@@ -0,0 +1,10 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["renovatebot/github-action", "*", "input.renovate-image", "command-injection"]
- ["renovatebot/github-action", "*", "input.renovate-version", "command-injection"]
- ["renovatebot/github-action", "*", "input.docker-cmd-file", "command-injection"]
- ["renovatebot/github-action", "*", "input.docker-user", "command-injection"]
- ["renovatebot/github-action", "*", "input.docker-volumes", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["roots/issue-closer-action", "*", "input.issue-close-message", "code-injection"]
- ["roots/issue-closer-action", "*", "input.pr-close-message", "code-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["ros-tooling/setup-ros", "*", "input.required-ros-distributions", "command-injection"]

View File

@@ -4,3 +4,8 @@ extensions:
extensible: summaryModel
data:
- ["ruby/setup-ruby", "*", "input.ruby-version", "output.ruby-prefix", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["ruby/setup-ruby", "*", "input.ruby-version", "command-injection"]

View File

@@ -4,3 +4,8 @@ extensions:
extensible: summaryModel
data:
- ["salsify/action-detect-and-tag-new-version", "*", "input.tag-template", "output.tag", "taint"]
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["salsify/action-detect-and-tag-new-version", "*", "input.version-command", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["skitionek/notify-microsoft-teams", "*", "input.overwrite", "code-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["snow-actions/eclint", "*", "input.args", "command-injection"]

View File

@@ -0,0 +1,10 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["stackhawk/hawkscan-action", "*", "input.workspace", "command-injection"]
- ["stackhawk/hawkscan-action", "*", "input.apiKey", "command-injection"]
- ["stackhawk/hawkscan-action", "*", "input.command", "command-injection"]
- ["stackhawk/hawkscan-action", "*", "input.args", "command-injection"]
- ["stackhawk/hawkscan-action", "*", "input.version", "command-injection"]

View File

@@ -0,0 +1,6 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["step-security/harden-runner", "*", "input.allowed-endpoints", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["tibdex/backport", "*", "input.body_template", "code-injection"]
- ["tibdex/backport", "*", "input.head_template", "code-injection"]
- ["tibdex/backport", "*", "input.labels_template", "code-injection"]
- ["tibdex/backport", "*", "input.title_template", "code-injection"]

View File

@@ -19,4 +19,4 @@ extensions:
- ["tj-actions/changed-files", "*", "output.other_modified_files", "pull_request_target", "PR changed files"]
- ["tj-actions/changed-files", "*", "output.other_deleted_files", "pull_request_target", "PR changed files"]
- ["tj-actions/changed-files", "*", "output.modified_keys", "pull_request_target", "PR changed files"]
- ["tj-actions/changed-files", "*", "output.changed_keys", "pull_request_target", "PR changed files"]
- ["tj-actions/changed-files", "*", "output.changed_keys", "pull_request_target", "PR changed files"]

View File

@@ -0,0 +1,15 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["tripss/conventional-changelog-action", "*", "input.pre-release-identifier", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.git-user-name", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.git-user-email", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.git-url", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.github-token", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.git-pull-method", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.fallback-version", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.git-message", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.git-branch", "command-injection"]
- ["tripss/conventional-changelog-action", "*", "input.tag-prefix'", "command-injection"]

View File

@@ -0,0 +1,7 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["tryghost/action-deploy-theme", "*", "input.theme-name", "command-injection"]
- ["tryghost/action-deploy-theme", "*", "input.exclude", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["veracode/veracode-sca", "*", "input.url", "command-injection"]
- ["veracode/veracode-sca", "*", "input.path", "command-injection"]
- ["veracode/veracode-sca", "*", "input.skip-collectors", "command-injection"]
- ["veracode/veracode-sca", "*", "input.url", "command-injection"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["wearerequired/lint-action", "*", "input.git_name", "command-injection"]
- ["wearerequired/lint-action", "*", "input.git_email", "command-injection"]
- ["wearerequired/lint-action", "*", "input.commit_message", "command-injection"]

View File

@@ -0,0 +1,8 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["webfactory/ssh-agent", "*", "input.ssh-agent-cmd", "command-injection"]
- ["webfactory/ssh-agent", "*", "input.ssh-add-cmd", "command-injection"]
- ["webfactory/ssh-agent", "*", "input.git-cmd", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["zaproxy/action-baseline", "*", "input.docker_name", "command-injection"]
- ["zaproxy/action-baseline", "*", "input.target", "command-injection"]
- ["zaproxy/action-baseline", "*", "input.rules_file_name", "command-injection"]
- ["zaproxy/action-baseline", "*", "input.cmd_options", "command-injection"]

View File

@@ -0,0 +1,9 @@
extensions:
- addsTo:
pack: githubsecuritylab/actions-all
extensible: sinkModel
data:
- ["zaproxy/action-full-scan", "*", "input.docker_name", "command-injection"]
- ["zaproxy/action-full-scan", "*", "input.target", "command-injection"]
- ["zaproxy/action-full-scan", "*", "input.rules_file_name", "command-injection"]
- ["zaproxy/action-full-scan", "*", "input.cmd_options", "command-injection"]

View File

@@ -0,0 +1,38 @@
/**
* @name Command built from user-controlled sources
* @description Building a system command from user-controlled sources is vulnerable to insertion of
* malicious code by the user.
* @kind path-problem
* @problem.severity warning
* @security-severity 5.0
* @precision high
* @id actions/command-injection
* @tags actions
* security
* external/cwe/cwe-078
*/
import actions
import codeql.actions.TaintTracking
import codeql.actions.dataflow.FlowSources
import codeql.actions.dataflow.ExternalFlow
private class CommandInjectionSink extends DataFlow::Node {
CommandInjectionSink() { externallyDefinedSink(this, "command-injection") }
}
private module MyConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
predicate isSink(DataFlow::Node sink) { sink instanceof CommandInjectionSink }
}
module MyFlow = TaintTracking::Global<MyConfig>;
import MyFlow::PathGraph
from MyFlow::PathNode source, MyFlow::PathNode sink
where MyFlow::flowPath(source, sink)
select sink.getNode(), source, sink,
"Potential command injection in $@, which may be controlled by an external user.", sink,
sink.getNode().asExpr().(Expression).getRawExpression()

View File

@@ -0,0 +1,44 @@
/**
* @name Command built from user-controlled sources
* @description Building a system command from user-controlled sources is vulnerable to insertion of
* malicious code by the user.
* @kind path-problem
* @problem.severity error
* @security-severity 9
* @precision high
* @id actions/critical-command-injection
* @tags actions
* security
* external/cwe/cwe-078
*/
import actions
import codeql.actions.TaintTracking
import codeql.actions.dataflow.FlowSources
import codeql.actions.dataflow.ExternalFlow
private class CommandInjectionSink extends DataFlow::Node {
CommandInjectionSink() { externallyDefinedSink(this, "command-injection") }
}
private module MyConfig implements DataFlow::ConfigSig {
predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
predicate isSink(DataFlow::Node sink) { sink instanceof CommandInjectionSink }
}
module MyFlow = TaintTracking::Global<MyConfig>;
import MyFlow::PathGraph
from MyFlow::PathNode source, MyFlow::PathNode sink, Workflow w
where
MyFlow::flowPath(source, sink) and
w = source.getNode().asExpr().getEnclosingWorkflow() and
(
w instanceof ReusableWorkflow or
w.hasTriggerEvent(source.getNode().(RemoteFlowSource).getATriggerEvent())
)
select sink.getNode(), source, sink,
"Potential critical command injection in $@, which may be controlled by an external user.", sink,
sink.getNode().asExpr().(Expression).getRawExpression()

Some files were not shown because too many files have changed in this diff Show More