Skip to content

Conversation

@chrisgavin
Copy link
Contributor

This adds a query to detect new instances of the problem fixed in #309, by looking for any unqualified binary names (e.g. "git") being executed without being passed through safeWhich.

Merge / deployment checklist

  • Confirm this change is backwards compatible with existing workflows.
  • Confirm the readme has been updated if necessary.

@chrisgavin chrisgavin marked this pull request as ready for review November 20, 2020 11:50
@robertbrignull
Copy link
Contributor

Query looks correct to me. Do you have a link to a test? Perhaps temporarily introduce a vulnerability in this PR or on another branch and we'll check the query finds it.

@chrisgavin
Copy link
Contributor Author

Sure @robertbrignull. I've opened #315 which reverts the fixes made in #309 to show that it finds the original issues.

Copy link
Contributor

@robertbrignull robertbrignull left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks. LGTM

@chrisgavin chrisgavin merged commit 7589c05 into main Nov 20, 2020
@chrisgavin chrisgavin deleted the query-binary-planting branch November 20, 2020 15:25
@github-actions github-actions bot mentioned this pull request Nov 23, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants