Skip to content

Conversation

@ColeMurray
Copy link
Contributor

@ColeMurray ColeMurray commented Nov 26, 2025

Summary

  • Use environment variables instead of direct expression interpolation for workflow inputs in shell commands
  • Prevents potential command injection if input values contain shell metacharacters

Context

The npm_update_latest_prefect.yaml workflow was using ${{ inputs.package_name }} and ${{ inputs.package_version }} directly in shell run commands. This pattern can allow command injection because the expressions are interpolated before the shell executes, meaning special characters in the inputs could be interpreted as shell commands.

This change moves the inputs to environment variables, which are safely handled as string values by the shell.

Use environment variables instead of direct expression interpolation
for workflow inputs in shell commands. Direct use of ${{ inputs.* }}
in run scripts can allow command injection if input values contain
shell metacharacters. Moving inputs to env variables ensures they
are treated as string values by the shell.
@github-actions
Copy link
Contributor

This pull request is stale because it has been open 14 days with no activity. To keep this pull request open remove stale label or comment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant