Skip to main content

gha-security-review

Identifies exploitable vulnerabilities in GitHub Actions workflows, ensuring findings include concrete exploitation scenarios.

Install this skill

or
0/100

Security score

The gha-security-review skill was audited on May 19, 2026 and we found 10 security issues across 2 threat categories, including 9 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

high line 81

Template literal with variable interpolation in command context

SourceSKILL.md
81| `${{ }}` in `run:` blocks | `references/expression-injection.md` |
high line 102

Template literal with variable interpolation in command context

SourceSKILL.md
102Are `${{ }}` expressions used inside `run:` blocks in externally-triggerable workflows?
high line 103

Template literal with variable interpolation in command context

SourceSKILL.md
103- Map every `${{ }}` expression in every `run:` step
high line 145

Template literal with variable interpolation in command context

SourceSKILL.md
145| `${{ github.event.pull_request.number }}` in `run:` | Numeric only — not injectable |
high line 146

Template literal with variable interpolation in command context

SourceSKILL.md
146| `${{ github.repository }}` / `github.repository_owner` | Repo owner controls this |
high line 147

Template literal with variable interpolation in command context

SourceSKILL.md
147| `${{ secrets.* }}` | Not an expression injection vector |
high line 148

Template literal with variable interpolation in command context

SourceSKILL.md
148| `${{ }}` in `if:` conditions | Evaluated by Actions runtime, not shell |
high line 149

Template literal with variable interpolation in command context

SourceSKILL.md
149| `${{ }}` in `with:` inputs | Passed as string parameters, not shell-evaluated |
high line 154

Template literal with variable interpolation in command context

SourceSKILL.md
154**Key distinction:** `${{ }}` is dangerous in `run:` blocks (shell expansion) but safe in `if:`, `with:`, and `env:` at the job/step level (Actions runtime evaluation).
low line 11

External URL reference

SourceSKILL.md
11by StepSecurity (2025): https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation
Scanned on May 19, 2026
View Security Dashboard
Installation guide →