-
Notifications
You must be signed in to change notification settings - Fork 266
Closed as not planned
Closed as not planned
Copy link
Labels
Description
Objective
Fix the medium severity security finding (artipacked) in daily-copilot-token-report.lock.yml to prevent credential persistence through GitHub Actions artifacts.
Context
From discussion #15009 - Static analysis identified credential persistence risk at line 115 of the workflow. This has been recurring since Feb 5.
Zizmor Finding:
- Severity: Medium
- Location: Line 115
- Description: Credentials may persist through GitHub Actions artifacts
- Impact: Potential credential exposure if artifacts are publicly accessible
- Reference: docs.zizmor.sh/rules/artipacked
Approach
- Review
daily-copilot-token-report.lock.yml(line 115) to identify artifact upload with credentials - Check the source
.mdworkflow file for the corresponding frontmatter/configuration - Evaluate if token persistence through artifacts is necessary:
- If necessary: Ensure artifacts are private, time-limited, and properly scoped
- If not necessary: Remove artifact upload or sanitize content before upload
- Update the workflow to eliminate the security finding
- Recompile the workflow with
make recompile - Verify the fix with
gh aw compile --zizmoror similar validation
Files to Modify
.github/workflows/daily-copilot-token-report.md(source workflow).github/workflows/daily-copilot-token-report.lock.yml(will be regenerated)
Acceptance Criteria
- artipacked finding eliminated from zizmor scan
- No credentials persist in artifacts (or properly secured if required)
- Workflow recompiled successfully
- Workflow still functions as intended
AI generated by Plan Command for discussion #15009
- expires on Feb 14, 2026, 1:28 AM UTC
Reactions are currently unavailable