New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
codecov bash uploader security update #2762
Comments
Thanks for opening this @jeromedockes ! 👍 |
It looks like the codecov action will soon compute the checksum of the script and make sure it is not corrupted, see codecov/codecov-action#281 |
@jeromedockes after looking into this, I think the only potential issue could come from the codecov action which indeed uses the uploader script. AFAICT, the workflow in which this action is used doesn't have access to any secret. nilearn/.github/workflows/main.yml Line 13 in 82f4075
|
@jeromedockes after looking into this, I think the only potential issue could come from the codecov action which indeed uses the uploader script. AFAICT, the workflow in which this action is used doesn't have access to any secret.
There are ongoing discussions (see jupyterhub/team-compass#398 for example) to find out whether actions from one workflow could potentially affect or get information from other workflows. I cannot find a precise answer for this question at the moment.
Note that we have one workflow (without codecov action in it) using a secret:
https://github.com/nilearn/nilearn/blob/82f4075d8a8ea9aec25e66bd87ebb79a6be6d32f/.github/workflows/main.yml#L13
thanks for looking into it! it is used to upload the doc?
generating a new token is easier than figuring out if we need to, so I
suggest we change it
|
@jeromedockes I'm wondering whether we shouldn't just remove the codecov action from the workflow, and use a script instead (similar to what is done for the azure pipeline)? |
in case the same thing happens again with the github action in the future? I don't have a strong opinion, let's do what you think is best! using the codecov package instead of the bash uploader shouldn't be hard to do if you think it is more suited
actually I think I read your previous comment a bit too fast this morning; IIUC the token in question is the |
It seems like codecov merged their checksum verification PR a couple days ago: codecov/codecov-action#282 and bumped to v1.4.0, so I suppose we can keep the codecov action in the workflow. Moreover, we are not using any secret in the "compromised" workflow. The github token is used in another workflow, and therefore shouldn't be accessible (see discussion linked in my previous comment).
Absolutely, you are right. I had forgotten about that when I replied. See github doc page here. Based on these points, I think we can close this without any action from our part. WDYT? |
Yes I agree, thanks for making sure! |
https://codecov.io/disclosure
still if someone else eg @NicolasGensollen could have a look at this that would be great!
The text was updated successfully, but these errors were encountered: