Workflow secrets should only be usable by direct name #174045
Replies: 1 comment
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
The recent worm on npm used
toJSON(secrets)in it's persisting workflow.Would it be possible to prohibit direct access to the full object?
Is there any legitimate use for accessing the entire
secretsobject?I would imagine everyone references secrets by name.
This would make such an attack harder, requiring an attacker to first collect all secret names that are actively in use based on the actual workflows. Currently, even unused secrets would be extracted this way.
Beta Was this translation helpful? Give feedback.
All reactions