Skip to content

download-lambda does not protect against possible supply-chain attacks #5011

@Bertg

Description

@Bertg

When defining download-lambda configurations we can specify a tag and name which will be used to build a url that will be used to download a zip file.

This architecture fundamentally assumes that github.com or the interface between the runner and github.com can or will not get compromised. Or that the project would not get compromised.

This is not ideal.

Using this configuration as an attack vector could be mitigated by adding the checksum to the lambda config:

module "lambdas" {
  # ...
  lambdas = [
    {
      name = "webhook"
      tag  = "v0.15.0"
      checksum = "sha256:f22c4b9b49dcaca119e0bb1b35efddea8b33fe2d7df7b33e703222e197d40c74"
    }.
    # ...
  ]
}

This checksum can then be used to validate if the file downloaded by curl is what it should be.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions