Skip to content

Conversation

@yoonhyejin
Copy link
Collaborator

No description provided.

@github-actions github-actions bot added the devops PR or Issue related to DataHub backend & deployment label Nov 4, 2025
Comment on lines +4 to +5
pull_request_target:
types: [opened]

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Using unsafe GitHub Actions trigger may allow privilege escalation via CI/CD - high severity
Using pull_request_target or workflow_run as a trigger is not recommended, as it may allow an attacker to elevate its privileges via the CI/CD pipeline by exfiltrating secrets (e.g. by reading out the caches of the GitHub Actions pipeline or listing loaded secrets in the environment). If the affected repository is open source, the attacker doesn't have to be an insider but could be any GitHub user.

Remediation: Avoid using pull_request_target or workflow_run as a trigger.
View details in Aikido Security

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

devops PR or Issue related to DataHub backend & deployment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant