You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/en/rules/untrusted_checkout_exec.md
+17Lines changed: 17 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -194,8 +194,25 @@ jobs:
194
194
})
195
195
```
196
196
197
+
### Azure DevOps
198
+
199
+
#### Caveat
200
+
False positives are likely given that static analysis of solely the pipeline file is not enough to confirm exploitability
201
+
202
+
#### Recommended
203
+
##### Azure DevOps Settings
204
+
Organization Setting:
205
+

206
+
207
+
Avoid activating the following settings to prevent issues:
208
+

209
+
210
+
211
+
197
212
## See Also
198
213
- [Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)
199
214
- [Erosion of Trust: Unmasking Supply Chain Vulnerabilities in the Terraform Registry](https://boostsecurity.io/blog/erosion-of-trust-unmasking-supply-chain-vulnerabilities-in-the-terraform-registry)
200
215
- [The tale of a Supply Chain near-miss incident](https://boostsecurity.io/blog/the-tale-of-a-supply-chain-near-miss-incident)
201
216
- [Living Off The Pipeline](https://boostsecurityio.github.io/lotp/)
0 commit comments