-
Notifications
You must be signed in to change notification settings - Fork 5
Open
Description
Hi team,
I noticed that the qlty-action currently downloads the qlty CLI binary without performing any kind of checksum verification (e.g., SHA256). This poses a potential security risk, as the binary could be tampered with during transmission or replaced if the source is compromised.
Why this matters:
- Without checksum validation, there’s no guarantee that the binary being executed is authentic or unmodified.
- It increases the risk of supply chain attacks, especially in CI/CD environments where automated trust is essential.
Suggested solution:
- Provide and verify a checksum (e.g., SHA256 hash) for the binary after downloading.
- Consider publishing checksums alongside the release assets and verifying them in the action workflow.
Implementing checksum verification would enhance the security and reliability of this GitHub Action.
Metadata
Metadata
Assignees
Labels
No labels