cicd-expert

skills-sh:martinholovsky_claude-skills-generator__cicd-expert

View source
C
69/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

8

Score

69/100

HIGH 1
MEDIUM 2
LOW 5

Findings (8)

HIGH
Binary download and execute
L67

Detects downloading a binary file followed by making it executable

curl https://raw.githubusercontent.com/rhysd/actionlint/main/scripts/download + ./a
FIX

Pin the download to a specific version tag or commit hash. Verify the downloaded file's checksum before using it. Avoid piping curl output directly to a shell.

FP?

Likely FP if downloading from an official, well-known domain (e.g., deno.land, rustup.rs) with HTTPS, though this pattern remains risky even with trusted sources.

MEDIUM
Cross-tool data leakage
L28

Detects patterns where credential or secret reads are combined with external data transmission

access to source code, secret + Upload only build output
FIX

Prevent credentials and sensitive data obtained by one MCP tool from being passed to other tools. Implement data isolation between tools and restrict cross-tool data flow for secrets.

FP?

Likely FP if the cross-tool data flow is intentional API authentication (e.g., a tool fetches an auth token that another tool uses for the same service).

MEDIUM
Runtime URL controls agent behavior
L67

Detects skills fetching external URLs to use as runtime instructions

curl https://raw.githubusercontent.com + configuration
FIX

Pin the downloaded resource to a specific version or commit hash, and verify its integrity with a checksum (SHA-256). Avoid fetching scripts or binaries from arbitrary URLs at runtime.

FP?

Likely FP if the download URL points to a well-known CDN or package registry (e.g., npmjs.com, pypi.org) and is pinned to a specific version.

LOW
Mutable GitHub raw content reference
L67

Detects references to raw.githubusercontent.com on mutable branches like main/master

raw.githubusercontent.com/rhysd/actionlint/main/
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Unpinned GitHub Actions
L395

Detects GitHub Actions references using mutable branch names instead of pinned commit SHAs or tags

uses: sonarsource/sonarqube-scan-action@master
FIX

Verify that build scripts and Makefiles do not download or run code from untrusted sources. Audit all build steps and pin any external tools used during the build process.

FP?

Likely FP if the build script only runs standard toolchain commands (e.g., cargo build, go build) without downloading external resources.

LOW
Unpinned GitHub Actions
L486

Detects GitHub Actions references using mutable branch names instead of pinned commit SHAs or tags

uses: aquasecurity/trivy-action@master
FIX

Verify that build scripts and Makefiles do not download or run code from untrusted sources. Audit all build steps and pin any external tools used during the build process.

FP?

Likely FP if the build script only runs standard toolchain commands (e.g., cargo build, go build) without downloading external resources.

LOW
Unpinned GitHub Actions
L625

Detects GitHub Actions references using mutable branch names instead of pinned commit SHAs or tags

uses: sonarsource/sonarqube-scan-action@master
FIX

Verify that build scripts and Makefiles do not download or run code from untrusted sources. Audit all build steps and pin any external tools used during the build process.

FP?

Likely FP if the build script only runs standard toolchain commands (e.g., cargo build, go build) without downloading external resources.

LOW
Unpinned GitHub Actions
L948

Detects GitHub Actions references using mutable branch names instead of pinned commit SHAs or tags

uses: some-org/action@main
FIX

Verify that build scripts and Makefiles do not download or run code from untrusted sources. Audit all build steps and pin any external tools used during the build process.

FP?

Likely FP if the build script only runs standard toolchain commands (e.g., cargo build, go build) without downloading external resources.