Skip to content

Commit c4e8b1a

Browse files
authored
Merge pull request #19307 from adityasharad/actions/public-preview-cleanup
Actions: Remove preview notice, minor help and metadata fixes
2 parents ff8cd98 + 4952768 commit c4e8b1a

File tree

6 files changed

+10
-6
lines changed

6 files changed

+10
-6
lines changed

Diff for: actions/ql/src/Security/CWE-077/EnvVarInjectionMedium.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ An attacker could craft a malicious artifact that writes dangerous environment v
109109
110110
### Exploitation
111111
112-
An attacker is be able to run arbitrary code by injecting environment variables such as `LD_PRELOAD`, `BASH_ENV`, etc.
112+
An attacker would be able to run arbitrary code by injecting environment variables such as `LD_PRELOAD`, `BASH_ENV`, etc.
113113
114114
## References
115115

Diff for: actions/ql/src/Security/CWE-275/MissingActionsPermissions.ql

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
22
* @name Workflow does not contain permissions
3-
* @description Workflows should contain permissions to provide a clear understanding has permissions to run the workflow.
3+
* @description Workflows should contain explicit permissions to restrict the scope of the default GITHUB_TOKEN.
44
* @kind problem
55
* @security-severity 5.0
66
* @problem.severity warning

Diff for: actions/ql/src/Security/CWE-312/ExcessiveSecretsExposure.ql

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
* @description All organization and repository secrets are passed to the workflow runner.
44
* @kind problem
55
* @precision high
6+
* @security-severity 5.0
67
* @problem.severity warning
78
* @id actions/excessive-secrets-exposure
89
* @tags actions

Diff for: actions/ql/src/Security/CWE-312/UnmaskedSecretExposure.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22

33
## Description
44

5-
Secrets derived from other secrets are not know to the workflow runner and therefore not masked unless explicitly registered.
5+
Secrets derived from other secrets are not known to the workflow runner, and therefore are not masked unless explicitly registered.
66

77
## Recommendations
88

9-
Avoid defining non-plain secrets. For example, do not define a new secret containing a JSON object and then read properties out of it from the workflow since these read values will not be masked by the workflow runner.
9+
Avoid defining non-plain secrets. For example, do not define a new secret containing a JSON object and then read properties out of it from the workflow, since these read values will not be masked by the workflow runner.
1010

1111
## Examples
1212

Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
---
2+
category: fix
3+
---
4+
* Assigned a `security-severity` to the query `actions/excessive-secrets-exposure`.

Diff for: docs/codeql/reusables/supported-versions-compilers.rst

+1-2
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
.NET Core up to 3.1
1717

1818
.NET 5, .NET 6, .NET 7, .NET 8, .NET 9","``.sln``, ``.csproj``, ``.cs``, ``.cshtml``, ``.xaml``"
19-
GitHub Actions [12]_,"Not applicable",Not applicable,"``.github/workflows/*.yml``, ``.github/workflows/*.yaml``, ``**/action.yml``, ``**/action.yaml``"
19+
GitHub Actions,"Not applicable",Not applicable,"``.github/workflows/*.yml``, ``.github/workflows/*.yaml``, ``**/action.yml``, ``**/action.yaml``"
2020
Go (aka Golang), "Go up to 1.24", "Go 1.11 or more recent", ``.go``
2121
Java,"Java 7 to 24 [5]_","javac (OpenJDK and Oracle JDK),
2222

@@ -41,4 +41,3 @@
4141
.. [9] Requires glibc 2.17.
4242
.. [10] Support for the analysis of Swift requires macOS.
4343
.. [11] TypeScript analysis is performed by running the JavaScript extractor with TypeScript enabled. This is the default.
44-
.. [12] Support for GitHub Actions is in public preview.

0 commit comments

Comments
 (0)