Skip to content

Add Dependabot auto-merge#52

Merged
Pigbibi merged 3 commits into
mainfrom
chore/dependabot-auto-merge
May 12, 2026
Merged

Add Dependabot auto-merge#52
Pigbibi merged 3 commits into
mainfrom
chore/dependabot-auto-merge

Conversation

@Pigbibi
Copy link
Copy Markdown
Collaborator

@Pigbibi Pigbibi commented May 12, 2026

Enable automatic merging for Dependabot PRs after CI succeeds, and suppress semver major dependency updates for safety.

@Pigbibi Pigbibi merged commit f528a9c into main May 12, 2026
1 check passed
@Pigbibi Pigbibi deleted the chore/dependabot-auto-merge branch May 12, 2026 01:50
Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 7603210fff

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

env:
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: |
BRANCH_NAME="${{ github.event.workflow_run.head_branch }}"
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Quote workflow_run branch safely before shell interpolation

github.event.workflow_run.head_branch is interpolated directly into BRANCH_NAME="..." in a shell script, so a branch name containing backticks triggers command substitution at assignment time. Because this workflow runs on workflow_run with contents: write/pull-requests: write, an attacker can open a PR from a branch like dependabot/...`` and get arbitrary shell execution before the later Dependabot author check runs. This creates a privilege-escalation path from untrusted branch names into a privileged workflow; treat the branch name as untrusted input and pass it via a safe channel (e.g., environment variable already escaped by Actions, or strict sanitization before shell evaluation).

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant