Skip to content

Fix shell injection vulnerability in release workflow#123

Open
fix-it-felix-sentry[bot] wants to merge 1 commit intomainfrom
fix/CCMRG-2208-shell-injection-vulnerability
Open

Fix shell injection vulnerability in release workflow#123
fix-it-felix-sentry[bot] wants to merge 1 commit intomainfrom
fix/CCMRG-2208-shell-injection-vulnerability

Conversation

@fix-it-felix-sentry
Copy link
Copy Markdown

Summary

This PR fixes a high-severity security vulnerability where untrusted GitHub context data (github.ref_name) was being used directly in a shell script, potentially allowing code injection attacks.

Changes

  • Moved github.ref_name to an environment variable REF_NAME
  • Updated the shell script to reference the environment variable with proper quoting

This prevents attackers from injecting malicious code through branch names or other GitHub context data that could be controlled by untrusted users.

Security Impact

Severity: High

The vulnerability allowed potential code injection in GitHub Actions runners, which could lead to:

  • Secret exfiltration
  • Code tampering
  • Unauthorized access to cloud resources

References

🤖 Generated with Claude Code

Move github.ref_name from direct interpolation to environment variable
to prevent potential code injection attacks. This addresses the security
finding where untrusted GitHub context data could be used to inject
malicious code into the runner.

Fixes: https://linear.app/getsentry/issue/VULN-1591
Fixes: https://linear.app/getsentry/issue/CCMRG-2208

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@linear-code
Copy link
Copy Markdown

linear-code Bot commented Apr 29, 2026

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants