Automatic Security Assessment of GitHub Actions Workflows

08/07/2022
by   Giacomo Benedetti, et al.
0

The demand for quick and reliable DevOps operations pushed distributors of repository platforms to implement workflows. Workflows allow automating code management operations directly on the repository hosting the software. However, this feature also introduces security issues that directly affect the repository, its content, and all the software supply chains in which the hosted code is involved in. Hence, an attack exploiting vulnerable workflows can affect disruptively large software ecosystems. To empirically assess the importance of this problem, in this paper, we focus on the de-facto main distributor (i.e., GitHub), and we developed a security assessment methodology for GitHub Actions workflows, which are widely adopted in software supply chains. We implemented the methodology in a tool (GHAST) and applied it on 50 open-source projects. The experimental results are worrisome as they allowed identifying a total of 24,905 security issues (all reported to the corresponding stakeholders), thereby indicating that the problem is open and demands further research and investigation.

READ FULL TEXT

page 3

page 4

page 7

research
05/23/2023

Software supply chain: review of attacks, risk assessment strategies and security controls

The software product is a source of cyber-attacks that target organizati...
research
02/23/2023

Automatic Detecting Unethical Behavior in Open-source Software Projects

Given the rapid growth of Open-Source Software (OSS) projects, ethical c...
research
05/25/2023

An Empirical Study on Workflows and Security Policies in Popular GitHub Repositories

In open-source projects, anyone can contribute, so it is important to ha...
research
04/13/2021

Reproducible Builds: Increasing the Integrity of Software Supply Chains

Although it is possible to increase confidence in Free and Open Source S...
research
06/28/2022

GitHub Actions: The Impact on the Pull Request Process

Automated tools are frequently used in social coding repositories to per...
research
03/30/2020

Repository for Reusing Artifacts of Artificial Neural Networks

Artificial Neural Networks (ANNs) replaced conventional software systems...
research
10/16/2020

SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers

In this paper we introduce SAIBERSOC, a tool and methodology enabling se...

Please sign up or login with your details

Forgot password? Click here to reset