Fill the gap between poutine and semgrep rules
https://github.com/semgrep/semgrep-rules/blob/develop/yaml/github-actions/security/allowed-unsecure-commands.yaml https://github.com/semgrep/semgrep-rules/blob/develop/yaml/github-actions/security/curl-eval.yaml https://github.com/contributor-assistant/github-action/blob/master/.github/workflows/notify-about-new-pr-via-slack.yml#L17 https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#workflow_run
I have added workflow_run scenario here https://github.com/messypoutine/gravy-overflow/blob/main/.github/workflows/level1.yml#L34-L43
Create curl | bash rule in experiemental repo
Research epic on deno run , curl | X , go run x.com/cmd/some@main , npx etc
- bash <(curl https://raw.githubusercontent.com/rhysd/actionlint/main/scripts/download-actionlint.bash)
Closed when we added insecure command