Skip to content

Commit f3d1e1a

Browse files
Update content/enterprise-onboarding/github-actions-for-your-enterprise/security-hardening-for-github-actions.md
1 parent 2b8e32b commit f3d1e1a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/enterprise-onboarding/github-actions-for-your-enterprise/security-hardening-for-github-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ There are a number of different approaches available to help you mitigate the ri
166166

167167
### Avoid potentially dangerous workflow triggers
168168

169-
Avoid using the `pull_request_target` workflow trigger if not necessary. Prefer using `workflow_run` for privilege separation between workflows as described in [Keeping your GitHub Actions and workflows secure: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests). Only use these workflow triggers when the workflow actually needs the privileged context.
169+
Avoid using the `pull_request_target` workflow trigger if not necessary. Prefer using `workflow_run` for privilege separation between workflows as described in [Keeping your {% data variables.product.prodname_actions %} and workflows secure: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests). Only use these workflow triggers when the workflow actually needs the privileged context.
170170

171171
### Do not use the `pull_request_target` and `workflow_run` workflow triggers with untrusted content
172172

0 commit comments

Comments
 (0)