Github Workflow Disclosure
Searches for the presence of GitHub workflow files on provided URLs.
Security Misconfiguration (SM)
How this template works
The API selection filters in this template specify the criteria for selecting the URLs to be scanned. It filters the URLs based on the response code, ensuring that only URLs with a response code between 200 and 299 are considered. It also extracts the URL from the response and assigns it to the variable "urlVar".
The execute section in this template defines a single request to be executed. It uses the "urlPaths" word list, which contains a list of URLs to be appended to the base URL stored in the "urlVar" variable. The "modify_url" action modifies the request URL by appending each URL from the word list to the base URL.
The validation section specifies the criteria for validating the response of the executed request. It checks that the response code is equal to 200 and that the response payload contains specific keywords such as "on", "jobs", "steps", and "uses". If the response meets these criteria, it is considered valid.
Frequently asked questions
What is the purpose of this test
What impact can exposing GitHub workflow files have
What category does this vulnerability fall under
What are some common GitHub workflow file names that are checked during the test
What are the selection filters used for API requests in this test
What validation criteria are used to determine a successful test result