-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
One time key #432
One time key #432
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -17,7 +17,7 @@ jobs: | |
runs-on: ubuntu-latest | ||
steps: | ||
- name: Harden Runner | ||
uses: step-security/harden-runner@55d479fb1c5bcad5a4f9099a5d9f37c8857b2845 # v2.4.1 | ||
uses: step-security/harden-runner@f086349bfa2bd1361f7909c78558e816508cdc10 # v2.8.0 | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. [Low]Update comment in the YAML file There is a YAML file that seems to contain outdated comment. Update the comment in the YAML file |
||
with: | ||
egress-policy: audit | ||
|
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -16,6 +16,7 @@ type config struct { | |
RunId string | ||
WorkingDirectory string | ||
APIURL string | ||
OneTimeKey string | ||
Endpoints map[string][]Endpoint | ||
EgressPolicy string | ||
DisableTelemetry bool | ||
|
@@ -35,6 +36,7 @@ type configFile struct { | |
RunId string `json:"run_id"` | ||
WorkingDirectory string `json:"working_directory"` | ||
APIURL string `json:"api_url"` | ||
OneTimeKey string `json:"one_time_key"` | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. [High]Sensitive Information Exposure OneTimeKey field contains highly sensitive data and its usage should be minimized in configuration files. Avoid storing sensitive data in configuration files. Instead, consider using environment variables, secret management tools like Hashicorp Vault, AWS Secrets Manager, etc. |
||
AllowedEndpoints string `json:"allowed_endpoints"` | ||
EgressPolicy string `json:"egress_policy"` | ||
DisableTelemetry bool `json:"disable_telemetry"` | ||
|
@@ -67,6 +69,7 @@ func (c *config) init(configFilePath string) error { | |
c.DisableSudo = configFile.DisableSudo | ||
c.DisableFileMonitoring = configFile.DisableFileMonitoring | ||
c.Private = configFile.Private | ||
c.OneTimeKey = configFile.OneTimeKey | ||
return nil | ||
} | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[Low]Upgrade to the latest version of the action
Using an outdated action version may expose the workflow to old vulnerabilities and bugs. Update the action to the latest stable release version or to a version without known vulnerabilities.