You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Why This Matters:
This pattern appears in nearly every workflow and executes with elevated (sudo) privileges. While marked as "info" severity, the impact is high because:
All workflows depend on this installation method
Compromise of the source repository could affect all workflow executions
Sudo execution provides full system access
Recommended Action: Implement checksum verification or convert to GitHub Action (see fix suggestions below)
2. ⚠️ Template Injection
Tool: Zizmor
Severity: Informational
Count: 8 workflows
Impact: Medium
Why This Matters:
Template expressions can potentially execute attacker-controlled code if user input reaches these expressions.
Recommended Action: Review and sanitize all template expressions that use external data
3. ⚠️ Default Permissions on Risky Events
Tool: Poutine
Severity: Warning
Count: 6 workflows
Impact: Medium
Why This Matters:
Workflows triggered by external events (issue_comment, etc.) should have explicitly minimal permissions.
Recommended Action: Add explicit permissions blocks to affected workflows
4. ⚠️ Excessive Permissions
Tool: Zizmor
Severity: Medium
Count: 3 workflows
Impact: Medium
Why This Matters:
Overly broad permissions violate least privilege principle and increase attack surface.
Recommended Action: Scope down permissions to minimum required
This static analysis scan identified 99 findings across 84 workflows, with the most critical issue being unverified script execution affecting 98% of workflows. While most findings are categorized as informational or low severity, their widespread impact and the privileged execution context make them important to address.
Key Takeaway: The most impactful improvement would be addressing the unverified script execution pattern by either pinning to commit SHAs (quick win) or creating a dedicated GitHub Action (sustainable solution).
The analysis results have been stored in cache memory for historical tracking and trend analysis in future scans.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Successfully scanned 84 agentic workflow files using three static analysis tools to identify security vulnerabilities and code quality issues.
Findings by Tool
Clustered Findings by Tool and Type
🔴 Poutine Supply Chain Security Findings
1. Unverified Script Execution (82 workflows)
Severity: Info (Note)
Count: 82 occurrences
Impact: High - affects 98% of workflows
Issue: All workflows are downloading and executing an installation script without verification:
curl -sSL https://raw.githubusercontent.com/githubnext/gh-aw-firewall/main/install.sh | sudo AWF_VERSION=v0.7.0 bashSecurity Risk:
mainbranch (mutable reference)Affected Workflows (sample):
2. Default Permissions on Risky Events (6 workflows)
Severity: Warning
Count: 6 occurrences
Impact: Medium - potential security risk
Issue: Workflows use default permissions on risky events (issue_comment, pull_request, etc.) which may grant excessive permissions.
Affected Workflows:
🟡 Zizmor Security Scanner Findings
1. Excessive Permissions (3 workflows)
Severity: Medium
Count: 3 occurrences
Impact: Medium - unnecessary permission grants
Reference: (redacted)
Issue: Workflow jobs have overly broad permissions granted, violating principle of least privilege.
Affected Workflows:
Example:
2. Template Injection (8 workflows)
Severity: Informational
Count: 8 occurrences
Impact: Medium - potential code injection vector
Reference: (redacted)
Issue: Code injection risk via template expansion in workflow steps.
Affected Workflows:
Example:
✅ Actionlint Linting Results
Status: No issues found
Workflows Checked: 84
All workflows passed actionlint validation (includes shellcheck & pyflakes integration).
Top Priority Issues
1.⚠️ Unverified Script Execution (HIGHEST PRIORITY)
Why This Matters:
This pattern appears in nearly every workflow and executes with elevated (sudo) privileges. While marked as "info" severity, the impact is high because:
Recommended Action: Implement checksum verification or convert to GitHub Action (see fix suggestions below)
2.⚠️ Template Injection
Why This Matters:
Template expressions can potentially execute attacker-controlled code if user input reaches these expressions.
Recommended Action: Review and sanitize all template expressions that use external data
3.⚠️ Default Permissions on Risky Events
Why This Matters:
Workflows triggered by external events (issue_comment, etc.) should have explicitly minimal permissions.
Recommended Action: Add explicit permissions blocks to affected workflows
4.⚠️ Excessive Permissions
Why This Matters:
Overly broad permissions violate least privilege principle and increase attack surface.
Recommended Action: Scope down permissions to minimum required
Detailed Fix Suggestion
Priority 1: Fix Unverified Script Execution (82 workflows)
A comprehensive fix template has been created at
/tmp/gh-aw/cache-memory/fix-templates/poutine-unverified-script-exec.mdRecommended Approach (Short-term):
Pin the installation script to a specific commit SHA instead of using the mutable
mainbranch:Recommended Approach (Long-term):
Create a GitHub Action for awf installation:
Implementation Steps:
Alternative: Implement checksum verification:
Full Workflow Breakdown
All Workflows with Findings
Workflows with unverified_script_exec (82 total)
Workflows with excessive-permissions (3 total)
Workflows with template-injection (8 total)
Workflows with default_permissions_on_risky_events (6 total)
Recommendations
Immediate Actions (This Week)
Address Unverified Script Execution (Priority 1)
Fix Excessive Permissions (Priority 2)
Address Risky Event Permissions (Priority 3)
Short-term Actions (This Month)
Review Template Injections
Establish Security Baseline
Long-term Actions (This Quarter)
Create setup-awf GitHub Action
Implement Pre-commit Hooks
Security Training
Historical Context
This is the first comprehensive static analysis scan using all three tools together:
Scan Metadata
/tmp/gh-aw/cache-memory/security-scans/2026-01-01.json/tmp/gh-aw/cache-memory/fix-templates/Next Steps
Additional Resources
/tmp/gh-aw/cache-memory/fix-templates//tmp/gh-aw/cache-memory/security-scans/2026-01-01.jsonSummary
This static analysis scan identified 99 findings across 84 workflows, with the most critical issue being unverified script execution affecting 98% of workflows. While most findings are categorized as informational or low severity, their widespread impact and the privileged execution context make them important to address.
Key Takeaway: The most impactful improvement would be addressing the unverified script execution pattern by either pinning to commit SHAs (quick win) or creating a dedicated GitHub Action (sustainable solution).
The analysis results have been stored in cache memory for historical tracking and trend analysis in future scans.
Beta Was this translation helpful? Give feedback.
All reactions