fix(helm/dependabot/renovate): Fix broken automatic update #13613
DryRunSecurity / General Security Analyzer
succeeded
Nov 4, 2025 in 1s
DryRun Security
Details
General Security Analyzer Findings: 1 detected
⚠️ Arbitrary Code Execution in GitHub Actions from Forked Repository .github/workflows/test-helm-chart.yml (click for details)
| Type | Arbitrary Code Execution in GitHub Actions from Forked Repository |
| Description | The GitHub Actions workflow uses actions/checkout to retrieve code from github.event.pull_request.head.repo.full_name and github.event.pull_request.head.ref. This means the workflow checks out and executes code directly from the head of a pull request, which can originate from an untrusted forked repository. An attacker can submit a pull request with malicious code, which will then be executed within the workflow's context, potentially leading to exfiltration of the GITHUB_TOKEN or other secrets, or injection of malicious artifacts. |
| Filename | .github/workflows/test-helm-chart.yml |
| CodeLink | django-DefectDojo/.github/workflows/test-helm-chart.yml Lines 110 to 112 in 7957037 |
Loading