Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding actions:write to cla assistant workflow #49797

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

doggydogworld
Copy link
Contributor

CLA Assistant will rerun itself on issue comments and therefore needs actions:write permissions. This is because jobs from pull request comments (which are issue comments) are not considered for status checks. This will allow it to rerun the previously failed job.

@doggydogworld doggydogworld added the no-changelog Indicates that a PR does not require a changelog entry label Dec 4, 2024
@fheinecke
Copy link
Contributor

Requiring this isn't great as we're giving a pull request target workflow the ability to trigger any other workflow in our repo. I'm pretty sure that this could lead to compromising other repos (cloud-terraform via flux creds, shared-workflows via GH token, other repos via "reviewers" creds), eventually leading to a release compromise, which is effectively a compromise of everything else.

I'm concerned that if there is a vulnerability in this workflow (or any of its dependencies, now or in the future), then a malicious actor could cause a lot of damage with this permission, without any action required on our part. Are we certain this feature is worth the risk?

@doggydogworld
Copy link
Contributor Author

Requiring this isn't great as we're giving a pull request target workflow the ability to trigger any other workflow in our repo. I'm pretty sure that this could lead to compromising other repos (cloud-terraform via flux creds, shared-workflows via GH token, other repos via "reviewers" creds), eventually leading to a release compromise, which is effectively a compromise of everything else.

I'm concerned that if there is a vulnerability in this workflow (or any of its dependencies, now or in the future), then a malicious actor could cause a lot of damage with this permission, without any action required on our part. Are we certain this feature is worth the risk?

Hmm yeah that's a concern I had as well. Thinking about it, a workaround could be to use a 'recheck' label since that is tied to the pr. It would then function similarly to our changelog checker.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
no-changelog Indicates that a PR does not require a changelog entry size/sm
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants