Skip to content

Commit f6168b7

Browse files
Sharra-writesJarLobwrslatz
committed
Update content/actions/how-tos/security-for-github-actions/security-guides/security-hardening-for-github-actions.md
Co-authored-by: Jaroslav Lobačevski <jarlob@github.com> Co-authored-by: Will Slattum <wrslatz@gmail.com>
1 parent 3d6604a commit f6168b7

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/actions/how-tos/security-for-github-actions/security-guides/security-hardening-for-github-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ Avoid using the `pull_request_target` and `workflow_run` workflow triggers if no
182182

183183
### Do not use the `pull_request_target` and `workflow_run` workflow triggers with untrusted content
184184

185-
Avoid using the `pull_request_target` and `workflow_run` workflow triggers with untrusted pull requests or code content. Workflows that use these triggers must not explicitly checkout untrusted code, including from pull request forks or from repositories that are not under your control.
185+
Avoid using the `pull_request_target` and `workflow_run` workflow triggers with untrusted pull requests or code content. Workflows that use these triggers must not explicitly checkout untrusted code, including from pull request forks or from repositories that are not under your control. Workflows triggered on `workflow_run` should treat artifacts uploaded from other workflows with caution (i.e. as untrusted).
186186

187187
### Use CodeQL to detect potentially vulnerable workflows
188188

0 commit comments

Comments
 (0)