You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
build: Fix command injection possibility in playwright GHA (#16510)
resolves https://linear.app/getsentry/issue/FE-484
> Using variable interpolation ${{...}} with github context data in a
run: step could allow an attacker to inject their own code into the
runner. This would allow them to steal secrets and code. github context
data can have arbitrary user input and should be treated as untrusted.
Instead, use an intermediate environment variable with env: to store the
data and use the environment variable in the run: script. Be sure to use
double-quotes the environment variable, like this: "$ENVVAR".
0 commit comments