Static Analysis Report - February 2, 2026 #13288
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-02-09T14:42:25.795Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Analysis Summary
Static analysis scan completed on 150 workflow files using three tools: actionlint (with shellcheck integration), zizmor (GitHub Actions security scanner), and poutine (supply chain security).
Findings by Tool
Additional Warnings
Key Findings
1. ShellCheck SC2129 - Style Issue (actionlint)
Impact: 157 occurrences across 149 workflows
Severity: Style (not a security issue)
Issue: Individual redirects should be grouped
The most common finding is ShellCheck rule SC2129, which suggests using grouped commands with a single redirect instead of multiple individual redirects to the same file.
Example Pattern:
Root Cause: This appears in compiled
.lock.ymlfiles, likely generated by the workflow compiler. The issue is in how prompt scripts construct output.Affected Workflows: Essentially all 149 workflows are affected by this pattern.
2. Zizmor Obfuscation - Low Severity Warning
Impact: 126 occurrences across 63 workflows
Severity: Low (code quality issue)
Issue: Unnecessary use of expression syntax for literal values
Zizmor flags the use of
${{ '' }}and${{ 'literal-string' }}as potential obfuscation. While marked as a security concern, this appears to be unintentional - likely a compiler template issue.Example Pattern:
Root Cause: The compiler wraps literal values in expression syntax when they should be plain strings.
View Affected Workflows (63 total)
agent-persona-explorer, audit-workflows, ci-coach, ci-doctor, claude-code-user-docs-review, cli-version-checker, cloclo, code-scanning-fixer, copilot-agent-analysis, copilot-pr-nlp-analysis, copilot-pr-prompt-analysis, copilot-session-insights, daily-code-metrics, daily-compiler-quality, daily-copilot-token-report, daily-doc-updater, daily-firewall-report, daily-issues-report, daily-news, daily-performance-summary, daily-repo-chronicle, daily-safe-output-optimizer, deep-report, dependabot-bundler, developer-docs-consolidator, firewall-escape, github-mcp-structural-analysis, github-mcp-tools-report, glossary-maintainer, go-fan, go-logger, grumpy-reviewer, instructions-janitor, jsweep, lockfile-stats, mcp-inspector, org-health-report, pdf-summary, poem-bot, portfolio-analyst, pr-nitpick-reviewer, prompt-clustering-analysis, python-data-charts, q, safe-output-health, schema-consistency-checker, scout, secret-scanning-triage, security-fix-pr, security-review, sergo, slide-deck-maintainer, smoke-claude, smoke-codex, smoke-copilot, stale-repo-identifier, static-analysis-report, step-name-alignment, super-linter, technical-doc-writer, test-create-pr-error-handling, unbloat-docs, weekly-issue-summary
3. ShellCheck SC2086 - Info Level
Impact: 3 occurrences in 1 workflow (ci-coach)
Severity: Info
Issue: Missing quotes around variable expansion
4. Permission Warnings
Impact: 5 workflows (test files)
Severity: Configuration warning
Issue: Missing required permissions for GitHub toolsets
Affected test workflows:
These are intentional for testing purposes.
Clustered Findings by Tool and Type
Actionlint (ShellCheck Integration)
Total actionlint findings: 160
Zizmor (Security Scanner)
Total zizmor findings: 126
Poutine (Supply Chain Security)
No findings detected. All workflows passed supply chain security checks.
Fix Suggestions for SC2129 (Top Issue by Volume)
The SC2129 shellcheck warning affects virtually all workflows. Since these are compiled
.lock.ymlfiles, the fix should be applied at the compiler level rather than editing individual workflow files.Fix Approach
Alternative: Suppress the Warning
If the individual redirects are intentional for error handling or clarity:
Fix Suggestions for Obfuscation (Zizmor)
The zizmor obfuscation warning affects 63 workflows and should also be fixed at the compiler level.
Fix Approach
Historical Context
This is the baseline static analysis report for the gh-aw repository. Future scans will compare against this baseline to track:
Scan results have been stored in the persistent cache at
/tmp/gh-aw/cache-memory/security-scans/2026-02-02.jsonfor future reference.Recommendations
Priority 1: Code Quality (Low Urgency)
Priority 2: Documentation
Priority 3: Process Improvements
Impact Assessment
Overall Risk: Low
Functional Impact: None
All identified issues are code quality or style improvements. The workflows function correctly as-is.
Security Impact: Minimal
The zizmor obfuscation warnings are flagged as potential security concerns, but in this context they are clearly unintentional artifacts of template generation, not malicious obfuscation.
Next Steps
.lock.ymlfiles after compiler fixesScan Metadata
/tmp/gh-aw/cache-memory/security-scans/2026-02-02.json/tmp/gh-aw/cache-memory/fix-templates/Beta Was this translation helpful? Give feedback.
All reactions