Skip to content

Commit 49a0d0a

Browse files
Update content/actions/how-tos/security-for-github-actions/security-guides/security-hardening-for-github-actions.md
Co-authored-by: Jaroslav Lobačevski <jarlob@github.com>
1 parent abbb5ad commit 49a0d0a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/actions/how-tos/security-for-github-actions/security-guides/security-hardening-for-github-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ Avoid using the `pull_request_target` and `workflow_run` workflow triggers if no
182182

183183
### Do not use the `pull_request_target` and `workflow_run` workflow triggers with untrusted content
184184

185-
Avoid using the `pull_request_target` and `workflow_run` workflow triggers with untrusted pull requests or code content. Workflows that use these triggers must not explicitly checkout untrusted code, including from pull request forks or from repositories that are not under your control.
185+
Avoid using the `pull_request_target` and `workflow_run` workflow triggers with untrusted pull requests or code content. Workflows that use these triggers must not explicitly checkout untrusted code, including from pull request forks or from repositories that are not under your control. Workflows triggered on `workflow_run` should treat artifacts uploaded from other workflows with caution (i.e. as untrusted).
186186

187187
### Use CodeQL to detect potentially vulnerable workflows
188188

0 commit comments

Comments
 (0)