yossarian (1.3.6.1.4.1.55738)

@yossarian@infosec.exchange
1.4K Followers
134 Following
1.1K Posts

open source interloper; attracts bugs easily

אַ ביסל ייִדיש־פּאָסטינג

websitehttps://yossarian.net
bloghttps://blog.yossarian.net
githubhttps://github.com/woodruffw
blueskyhttps://bsky.app/profile/yossarian.net
great post from the folks over at grafana about how they’re using zizmor at scale across their whole estate: https://grafana.com/blog/2025/06/26/how-to-detect-vulnerable-github-actions-at-scale-with-zizmor/
How to detect vulnerable GitHub Actions at scale with Zizmor | Grafana Labs

In order to harden our infrastructure and pipelines, we have introduced the open source tool Zizmor into our CI/CD pipelines.

Grafana Labs
what’s the matter babe? you haven’t touched your 50 pounds of raisinettes

zizmor v1.10.0 is released!

this is a *huge* new release in terms of features, bugfixes, and enhancements. just to highlight a few:

* zizmor's new experimental fix mode is now available! users can use `--fix=[MODE]` to control it; see the docs for more: https://docs.zizmor.sh/usage/#auto-fixing-results

* the new anonymous-definition audit flags unnamed workflows and jobs for the pedantic persona: https://docs.zizmor.sh/audits/#anonymous-definition

* zizmor's location/fixture core has been rewritten to support "subfeatures," meaning that many audits now produce much nicer/more precise finding renders that are easier to read

read the full release notes here: https://docs.zizmor.sh/release-notes/#1100

#rust #security

Usage - zizmor

Usage tips and recipes for running zizmor locally and in CI/CD.

girls just wanna have -funroll-loops
"being unable to pronounce PyPI" continues to be a very strong predictor for whether you should not take a supply chain security company seriously
i deeply dislike that this parses correctly in GHA
אַ פֿרײַלאַך פּראַיד

The libxml2 maintainer is no longer accepting embargoed security reports. They just get treated like regular issues.

This bit in a comment on the announcement really resonates with me:

> these companies make billions of profits and refuse to pay back their technical debt, either by switching to better solutions, developing their own or by trying to improve libxml2.

Too often a company will depend on some library, and then when there are issues with it, shame the maintainer into fixing them. "There's a problem with your project, it is your responsibility to fix it".

No.

You chose to build on top of this library, and with that took on all responsibility that comes with that choice. Any tech debt or bugs are now YOUR tech debt and bugs. What are you going to do about them?

https://gitlab.gnome.org/GNOME/libxml2/-/issues/913

Triaging security issues reported by third parties (#913) · Issues · GNOME / libxml2 · GitLab

I have to spend several hours each week dealing with security issues reported by third parties. Most of these issues aren't critical but it's still a lot of...

GitLab
compare to the old render, which knew which part of the code block was problematic but couldn't span it discretely:

sneak peek for more precise subspanning within zizmor:

(this overcomes one of zizmor's earliest architectural limitations, i.e. that it could only span on full YAML elements and nothing within those elements. no longer!)