Skip to content

Enhance bucket name resolution with validation in account-terraform w…

af6e116
Select commit
Loading
Failed to load commit list.
Merged

VED-1223: Update permissions to auto-ops role so the pipeline can apply terraform changes at account level #1384

Enhance bucket name resolution with validation in account-terraform w…
af6e116
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / SonarCloud failed Apr 7, 2026 in 6s

6 new alerts including 6 high severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 6 high

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 37 in .github/workflows/account-terraform.yml

See this annotation in the file changed.

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

inputs.base\_sha is vulnerable to script injection: values of inputs are provided by whoever triggers the workflow. Change this workflow to not use user-controlled data directly in a run block, for example by assigning this expression to an environment variable. See more on SonarQube Cloud

Check failure on line 42 in .github/workflows/account-terraform.yml

See this annotation in the file changed.

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

inputs.head\_sha is vulnerable to script injection: values of inputs are provided by whoever triggers the workflow. Change this workflow to not use user-controlled data directly in a run block, for example by assigning this expression to an environment variable. See more on SonarQube Cloud

Check failure on line 87 in .github/workflows/account-terraform.yml

See this annotation in the file changed.

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

inputs.environment is vulnerable to script injection: values of inputs are provided by whoever triggers the workflow. Change this workflow to not use user-controlled data directly in a run block, for example by assigning this expression to an environment variable. See more on SonarQube Cloud

Check failure on line 94 in .github/workflows/account-terraform.yml

See this annotation in the file changed.

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

inputs.environment is vulnerable to script injection: values of inputs are provided by whoever triggers the workflow. Change this workflow to not use user-controlled data directly in a run block, for example by assigning this expression to an environment variable. See more on SonarQube Cloud

Check failure on line 156 in .github/workflows/account-terraform.yml

See this annotation in the file changed.

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

inputs.environment is vulnerable to script injection: values of inputs are provided by whoever triggers the workflow. Change this workflow to not use user-controlled data directly in a run block, for example by assigning this expression to an environment variable. See more on SonarQube Cloud

Check failure on line 163 in .github/workflows/account-terraform.yml

See this annotation in the file changed.

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

inputs.environment is vulnerable to script injection: values of inputs are provided by whoever triggers the workflow. Change this workflow to not use user-controlled data directly in a run block, for example by assigning this expression to an environment variable. See more on SonarQube Cloud