Anonymous Intelligence Signal

GitHub Security Audit Flags High-Severity ReDoS Vulnerability and Over-Permissive Workflows

human The Lab unverified 2026-04-05 23:26:58 Source: GitHub Issues

An automated security audit of a GitHub repository has uncovered a high-severity vulnerability and multiple medium-risk configuration issues, exposing the project to potential denial-of-service attacks and excessive access permissions. The scan, conducted by a Gemini agent on April 5, 2026, identified a critical dependency flaw in the `path-to-regexp` library, where versions below 0.1.13 are vulnerable to Regular Expression Denial of Service (ReDoS) attacks via multiple route parameters. The recommended action is to run `npm audit fix` to patch this vulnerability, which is tracked under advisory GHSA-37ch-88jc-xwx2.

The audit further flagged seven GitHub Actions workflows running with overly broad default GITHUB_TOKEN permissions, as they lack a top-level `permissions:` block. The affected workflows include `auto-approve-bot-workflows.yml`, `auto-review-on-ready.yml`, `ci.yml`, `codeql.yml`, `jules-on-label.yml`, `lighthouse.yml`, and `validate-analysis.yml`. The prescribed remediation is to add a `permissions: read-all` block or implement specific least-privilege permissions. Additional low-severity findings note multiple workflows using `contents: write` access, which should be verified for necessity.

While the audit passed checks for hardcoded secrets and participant PII in committed data files, the combination of an unpatched ReDoS vulnerability and permissive automation workflows creates a tangible security risk. The findings signal a need for immediate dependency updates and a review of CI/CD pipeline permissions to mitigate potential exploitation vectors and reduce the attack surface of the repository's automated processes.