ci: pin GitHub Actions to server SHAs and add hidden-unicode lint#423
Open
mpartipilo wants to merge 2 commits intomainfrom
Open
ci: pin GitHub Actions to server SHAs and add hidden-unicode lint#423mpartipilo wants to merge 2 commits intomainfrom
mpartipilo wants to merge 2 commits intomainfrom
Conversation
There was a problem hiding this comment.
Orca Security Scan Summary
| Status | Check | Issues by priority | |
|---|---|---|---|
| Infrastructure as Code | View in Orca | ||
| SAST | View in Orca | ||
| Secrets | View in Orca | ||
| Vulnerabilities | View in Orca |
Align all uses: refs to the immutable commit SHAs used by weaviate/weaviate. Major versions bumped where necessary: checkout v6, docker/login v4, upload-artifact v7, download-artifact v8, cache v5. Tags preserved as comments. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
7408f70 to
1d5f5f2
Compare
1 task
Delegates the trojan-source / hidden-unicode scan to the weaviate/weaviate/.github/actions/security-lint composite action shipped in weaviate/weaviate#11093, pinned to its merge commit (3e52fc80a244f4644d4facc6a4e705ea6eda9039). Uses pull_request_target so the workflow definition runs from the base branch and PR-controlled refs are never executed; the composite fetches the diff via the GitHub API.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
uses:refs in GitHub Actions workflows to the same commit SHAs used byweaviate/weaviate, so this client stays in lockstep with the server# v6) as a trailing comment for readability.github/workflows/pr-security-lint.yamlthat scans every PR diff for hidden Unicode / trojan-source characters by delegating to the reusable composite shipped in ci: delegate SHA-pinning to native policy, expose unicode scan as composite weaviate#11093 (pinned to merge commit3e52fc80a244f4644d4facc6a4e705ea6eda9039)Context
Two complementary layers of GitHub Actions hardening:
weaviate/weaviateis invoked here so all five Weaviate SDKs share one implementation.Security notes for the new workflow
pull_request_targetruns the workflow definition from the base branch, never from the PR.permissions: {}at workflow level;pull-requests: readis the only grant.Tradeoffs of delegating to an upstream composite
Pros
pull_request_targetruns the workflow definition from the base branch and the composite never checks out PR-controlled refs — a malicious PR can't alter the linter that's checking it.permissions: {}at workflow level,pull-requests: readat job level, no secrets referenced.Cons
weaviate/weaviate/.github/actions/security-lintbreaks all 5 clients until the SHA is bumped.pull_request_targetis a foot-gun — a future editor addingref: pull_request.head.shaor referencing a secret would re-introduce the attack surface this design is built to avoid. The file header warns against it, but the discipline lives in the reviewer.weaviate/weaviaterather than this repo, so debugging a false positive requires hopping to another repo to read the script.Test plan
pr-security-lintjob runs on this PR and passes (clean diff)🤖 Generated with Claude Code