Skip to content

Conversation

@forged-request
Copy link
Contributor

@forged-request forged-request commented Jan 9, 2026

Chore: standardize string quotes in workflow

@forged-request forged-request requested a review from a team as a code owner January 9, 2026 08:50
@forged-request forged-request requested review from SofiaMargariti and maxcheremisin and removed request for a team January 9, 2026 08:50
@vercel
Copy link

vercel bot commented Jan 9, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Review Updated (UTC)
nextjs-marketing-demo-bug-test Building Building Preview Jan 9, 2026 2:08pm
3 Skipped Deployments
Project Deployment Review Updated (UTC)
experience-builder-test-app Ignored Ignored Jan 9, 2026 2:08pm
studio-nextjs-marketing-demo Ignored Ignored Jan 9, 2026 2:08pm
studio-react-vite-template Ignored Ignored Jan 9, 2026 2:08pm

@wiz-inc-38d59fb8d7
Copy link

wiz-inc-38d59fb8d7 bot commented Jan 9, 2026

Wiz Scan Summary

Scanner Findings
Vulnerability Finding Vulnerabilities -
Data Finding Sensitive Data -
Secret Finding Secrets -
IaC Misconfiguration IaC Misconfigurations 1 Info
SAST Finding SAST Findings -
Software Supply Chain Finding Software Supply Chain Findings -
Total 1 Info

View scan details in Wiz

To detect these findings earlier in the dev lifecycle, try using Wiz Code VS Code Extension.

@forged-request forged-request requested a review from Copilot January 9, 2026 08:51
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR addresses a security concern by standardizing string quotes in GitHub Actions workflows to mitigate script injection attacks. The changes move from direct expression interpolation to environment variables with proper quoting, following GitHub's security best practices.

Key changes:

  • Replaced single quotes with double quotes for YAML string values (descriptions, step names, node version)
  • Migrated inline GitHub context expressions (${{ }}) to environment variables to prevent shell injection
  • Added proper quoting around shell variable references in conditional statements

Reviewed changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 1 comment.

File Description
.github/workflows/vercel.yaml Standardized quotes and moved GitHub context values to environment variables for three Vercel deployment steps
.github/workflows/publish.yaml Standardized quotes and secured shell script by using environment variables instead of inline expressions
.github/workflows/build.yaml Standardized quotes and moved ref_name to environment variable in echo step

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

- name: 'Merge changes downstream'
if: ${{ !inputs.publish-prerelease }}
- name: "Merge changes downstream"
if: ${{ !inputs.publish-prelease }}
Copy link

Copilot AI Jan 9, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Corrected spelling of 'prelease' to 'prerelease'.

Copilot uses AI. Check for mistakes.
@forged-request forged-request merged commit 08f8038 into development Jan 9, 2026
21 checks passed
@forged-request forged-request deleted the cfix branch January 9, 2026 15:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants