Commit d067806
Fix shell injection vulnerability in release workflow
Resolves command injection vulnerability by using environment variables
instead of direct GitHub context interpolation in shell scripts.
This prevents potential malicious code injection through user-controlled
input in github.event_name and github.event.inputs.version.
Changes:
- Added env section with GH_EVENT_NAME and GH_INPUT_VERSION
- Updated shell script to reference environment variables
- Added proper quoting around variables
Fixes: https://linear.app/getsentry/issue/ENG-6554
Parent: https://linear.app/getsentry/issue/VULN-1163
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>1 parent 1240425 commit d067806
1 file changed
Lines changed: 6 additions & 3 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
58 | 58 | | |
59 | 59 | | |
60 | 60 | | |
| 61 | + | |
| 62 | + | |
| 63 | + | |
61 | 64 | | |
62 | | - | |
63 | | - | |
| 65 | + | |
| 66 | + | |
64 | 67 | | |
65 | 68 | | |
66 | 69 | | |
67 | 70 | | |
68 | | - | |
| 71 | + | |
69 | 72 | | |
70 | 73 | | |
71 | 74 | | |
| |||
0 commit comments