Conversation
Collaborator
Author
|
I have also update permissions to require CI workflow approval for all external contributors. |
tjlaboss
approved these changes
Mar 9, 2026
Collaborator
Author
|
Thanks @tjlaboss |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Pull Request Checklist for MontePy
Description
This was inspired by a recent incident of an OpenClaw bot exploiting GHA. From this I was introduced to
zizmor, which performs a security audit on your github actions configuration.Things changed:
persist-credentials: falsefor allcheckoutruns. This avoid malicious code accessing the runner's secrets and being able to exploit them outside this one job.ghcli to create a release.The current audit issues are:
So for use of
steps.get_version.outputs.version. This is inside of the release process which only can run on protected branches, so we should catch malicious code prior to this exploit being used. For security I added a new environment that requires manual workflow approval prior to running this job (viaenvironment). This should provide a last line of defense.On the
pull_request_targetissue. This issue seems to be that the job is ran using the PR's code, but in the context of the parent repo. So this could give an unknown user instant access to secrets. However this is the job in question:I don't this is an issue for a few reasons:
Therefore I think this usage doesn't create a significant risk currently.
Note: this may break the deploy CI. I figure if it is broken it will stop the deployment, and we can deal with that issue when it comes up.
General Checklist
blackversion 25 or 26.LLM Disclosure
Are you?
Were any large language models (LLM or "AI") used in to generate any of this code?
Documentation Checklist
First-Time Contributor Checklist
pyproject.tomlif you wish to do so.Additional Notes for Reviewers
Ensure that:
📚 Documentation preview 📚: https://montepy--925.org.readthedocs.build/en/925/