Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add option to generate code excution commands/steps #15

Open
oreenlivnicode opened this issue Sep 19, 2023 · 1 comment
Open

Add option to generate code excution commands/steps #15

oreenlivnicode opened this issue Sep 19, 2023 · 1 comment
Labels
feature Low Priority query-library Query library related (library/*)

Comments

@oreenlivnicode
Copy link
Contributor

oreenlivnicode commented Sep 19, 2023

This is supposed to be fuctinality added to report sub-command.
After quering neo4j and finding vulnerable workflows or actions, it should print an explanation about the exploit, and how it could be exploited - for example -
"Command injection through PR name is possible in this workflow -
PR NAME = 'foo";{bash_command} "'

@alex-ilgayev
Copy link
Contributor

This may be a feature for the new query library.
How I see it, we can implement an additional field for the each query, like attack-path, that explains the risk in the specified query.
I some queries we should explain the best practice reasoning (like pinned hashes), in other queries (like injection ones), we can show a demonstration for an exploit. This should be an optional field though.
WDYT @oreenlivnicode @elad-pticha ?

@alex-ilgayev alex-ilgayev added the query-library Query library related (library/*) label Nov 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature Low Priority query-library Query library related (library/*)
Projects
None yet
Development

No branches or pull requests

2 participants