Skip to content

Security report — possible pull_request_target + checkout-head RCE (please contact privately) #455

@Raffa-jarrl

Description

@Raffa-jarrl

Hi —

Automated security scan flagged a pull_request_target workflow in your repo that checks out the PR's head SHA / ref. This is the classic GitHub Actions RCE pattern: an external contributor can submit a PR that adds arbitrary code, and the workflow runs that code with access to your repository secrets.

I'm not posting the specific file/line here for responsible-disclosure reasons.

Please contact me at Raffa@Lictor-AI.com and I'll send the exact workflow file + line that does the checkout + a 2-line patch.

The fix is usually one of:

  1. Switch to pull_request (no secret access)
  2. Keep pull_request_target but check out the base SHA only, never the head
  3. Add a permissions: block + restrict the secrets the workflow can read

References:

A note: this came from an automated scan I manually verified before reaching out. If we're wrong, please reply and we'll close out.

— Raffa
Lictor AI · https://lictorai.com

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions