You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Static analysis scan of agentic workflows using zizmor (security), poutine (supply chain), and actionlint (linting) on a subset of 11 active workflows.
Tools Used: zizmor, poutine, actionlint
Total Findings: 33
Workflows Scanned: 11
Workflows Affected: 11 (100%)
Findings by Tool
Tool
Total
Critical
High
Medium
Low
Info/Warning
zizmor (security)
0
0
0
0
0
0
poutine (supply chain)
11
0
0
0
0
11 (info)
actionlint (linting)
22
0
0
0
0
22 (11 info, 11 warning)
Clustered Findings by Tool and Type
Poutine Supply Chain Findings
All workflows exhibit the same supply chain security pattern:
Issue Type
Severity
Count
Pattern
unverified_script_exec
Info
11
Downloading and executing installer script without verification
Issue: The AWF (gh-aw-firewall) installer script is fetched from the main branch and piped directly to bash without cryptographic verification. While the source is a trusted repository, this pattern poses supply chain security risks.
Actionlint Linting Issues
Two shellcheck issues appear consistently across all workflows:
Issue Type
Severity
Count
Rule
Description
SC2012
Info
11
shellcheck
Use find instead of ls for better filename handling
SC2155
Warning
11
shellcheck
Declare and assign separately to avoid masking return values
Pattern: The supply chain and linting issues (poutine, actionlint) are infrastructure-wide, affecting the workflow generation process itself rather than individual workflow logic.
Top Priority Issues
1. Unverified Script Execution (Poutine)
Tool: Poutine
Count: 11 workflows (100% of scanned)
Severity: Info/Note
Impact: Supply chain security best practice violation
Description: AWF installer script is downloaded from main branch and executed without verification
Risk Level: Low-Medium (trusted source but lacks verification)
All issues are addressable and stem from common workflow infrastructure patterns rather than individual workflow security flaws. The recommended fixes are low-effort, low-risk changes that follow security best practices.
Key Insight: The consistency of findings across all workflows indicates these are systematic infrastructure issues rather than per-workflow problems. Fixing the workflow generation templates will resolve issues across the entire workflow suite.
Cache Memory
Analysis results stored in persistent cache memory:
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Static analysis scan of agentic workflows using zizmor (security), poutine (supply chain), and actionlint (linting) on a subset of 11 active workflows.
Findings by Tool
Clustered Findings by Tool and Type
Poutine Supply Chain Findings
All workflows exhibit the same supply chain security pattern:
Affected Workflows: static-analysis-report, audit-workflows, cli-version-checker, daily-doc-updater, daily-news, lockfile-stats, go-logger, go-pattern-detector, safe-output-health, copilot-agent-analysis, github-mcp-tools-report
Command Pattern:
curl -sSL https://raw.githubusercontent.com/githubnext/gh-aw-firewall/main/install.sh | sudo AWF_VERSION=v0.7.0 bashIssue: The AWF (gh-aw-firewall) installer script is fetched from the
mainbranch and piped directly to bash without cryptographic verification. While the source is a trusted repository, this pattern poses supply chain security risks.Actionlint Linting Issues
Two shellcheck issues appear consistently across all workflows:
Locations:
Affected Workflows: Same as above (all 11 workflows)
Zizmor Security Findings
✅ No security vulnerabilities found by zizmor in the scanned workflows.
Historical Trends
Comparing with previous scans from cache memory:
Trend Analysis
Note: Today's scan is a partial analysis of 11 workflows (subset), so direct comparison is limited. However:
Key Observations from Historical Data
From the 2025-12-25 full scan, the historical data shows:
Zizmor Issues Previously Found:
template-injection: 1 workflow (changeset)default_permissions_on_risky_events: 2 workflows (tidy, unbloat-docs)Pattern: The supply chain and linting issues (poutine, actionlint) are infrastructure-wide, affecting the workflow generation process itself rather than individual workflow logic.
Top Priority Issues
1. Unverified Script Execution (Poutine)
mainbranch and executed without verification2. Variable Declaration Masking Return Values (SC2155)
3. Use of ls Command (SC2012)
Fix Suggestion for Unverified Script Execution
Issue: Poutine
unverified_script_exec- Most Common Issue (11 workflows)Severity: Info/Note
Affected: All scanned workflows using AWF firewall
Problem
The current pattern fetches the installer script from the
mainbranch without verification:curl -sSL https://raw.githubusercontent.com/githubnext/gh-aw-firewall/main/install.sh | sudo AWF_VERSION=v0.7.0 bashIssues:
mainbranch (mutable reference)Recommended Fix
Option 1: Pin Installer to Version Tag (Quick Fix)
Change the installer URL from
mainto the version tag:Change:
/main/→/v0.7.0/Benefits:
mainbranch referenceOption 2: Download, Verify, Execute (Best Practice)
Two-step process with checksum verification:
Benefits:
Implementation Plan
mainto version tag)Files Requiring Updates
All workflows using AWF firewall infrastructure. Based on scan results, this includes at minimum:
.github/workflows/static-analysis-report.md.github/workflows/audit-workflows.md.github/workflows/cli-version-checker.md.github/workflows/daily-doc-updater.md.github/workflows/daily-news.md.github/workflows/lockfile-stats.md.github/workflows/go-logger.md.github/workflows/go-pattern-detector.md.github/workflows/safe-output-health.md.github/workflows/copilot-agent-analysis.md.github/workflows/github-mcp-tools-report.mdNote: Full scan would reveal additional affected workflows (126 workflows affected per 2025-12-25 scan).
Recommendations
Immediate Actions
Short-term Actions
Long-term Actions
Conclusion
The static analysis reveals no critical security vulnerabilities in the scanned workflows. The findings are primarily:
All issues are addressable and stem from common workflow infrastructure patterns rather than individual workflow security flaws. The recommended fixes are low-effort, low-risk changes that follow security best practices.
Key Insight: The consistency of findings across all workflows indicates these are systematic infrastructure issues rather than per-workflow problems. Fixing the workflow generation templates will resolve issues across the entire workflow suite.
Cache Memory
Analysis results stored in persistent cache memory:
/tmp/gh-aw/cache-memory/security-scans/2025-12-26.json- Today's scan results/tmp/gh-aw/cache-memory/vulnerabilities/by-tool.json- Historical trends updated/tmp/gh-aw/cache-memory/fix-templates/poutine-unverified_script_exec.md- Fix template createdReferences:
Beta Was this translation helpful? Give feedback.
All reactions