Skip to content

Commit 5a33ec2

Browse files
Update content/actions/how-tos/security-for-github-actions/security-guides/security-hardening-for-github-actions.md
Co-authored-by: Jaroslav Lobačevski <jarlob@github.com>
1 parent 9b07266 commit 5a33ec2

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/actions/how-tos/security-for-github-actions/security-guides/security-hardening-for-github-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ There are a number of different approaches available to help you mitigate the ri
178178

179179
### Avoid potentially dangerous workflow triggers
180180

181-
Avoid using the `pull_request_target` and `workflow_run` workflow triggers if not necessary. Only use these workflow triggers when the workflow actually needs the privileged context and access from the target repo to be available in the workflow.
181+
Avoid using the `pull_request_target` workflow trigger if not necessary. Prefer using `workflow_run` for privilege separation between workflows as described in [Keeping your GitHub Actions and workflows secure: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests). Only use these workflow triggers when the workflow actually needs the privileged context.
182182

183183
### Do not use the `pull_request_target` and `workflow_run` workflow triggers with untrusted content
184184

0 commit comments

Comments
 (0)