cache-poisoning when using docker/setup-buildx-action #611
-
I have the following steps in a workflow which get flagged by - name: Set up Docker Buildx
uses: docker/[email protected]
- name: Validate build configuration
uses: docker/[email protected]
The only thing I can see is that I don't quite understand why in this case there could be a problem with cache poisoning since it is just the binary which is used to build. Could someone please extra context for this particular case? It seems that #378 is relevant. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 7 replies
-
Hey @mschoettle, thanks for opening a discussion!
The problem is essentially that the cache poisoning attack is agnostic to whatever is being cached: it doesn't matter whether it's source, an artifact, or a full binary; if it gets executed or turned into an executable product, an attacker can potentially take advantage of it. In particular, in the Let me know if this helps! I'd also be happy to hear thoughts on how to improve the documentation here. |
Beta Was this translation helpful? Give feedback.
NB: A false positive has been fixed here with #644.