Skip to main content

Posts

Showing posts with the label YAML

Fixing GitHub Actions "Resource not accessible by integration" in Protected Branches

  If you are maintaining a repository with strict security defaults or branch protection rules, you have likely encountered this error log during a release pipeline or a PR automation step: HttpError: Resource not accessible by integration at /home/runner/work/.../index.js:14:10 ... status: 403 This 403 Forbidden error is the standard response when the ephemeral  GITHUB_TOKEN  attempts a write operation (creating a release, tagging a commit, or commenting on a PR) but lacks the specific OAuth scope required to execute it. The Root Cause: Least Privilege Defaults Historically, the auto-generated  GITHUB_TOKEN  provided to workflows had  read  and  write  access to almost all scopes by default. This was convenient but presented a massive surface area for supply chain attacks. If a third-party action was compromised, it could wipe your repository. GitHub updated the default setting for new organizations and repositories to  Rest...

Automating IDOR Detection: Writing Custom Nuclei Templates for Business Logic Vulnerabilities

  Standard Dynamic Application Security Testing (DAST) tools are notoriously bad at detecting Insecure Direct Object References (IDOR). Tools like OWASP ZAP or Arachni typically operate on a fuzzing basis—they throw garbage data at inputs and look for crashes or 500 errors. They fail at IDORs because an IDOR is not a syntactic error; it is a logic error. If User A requests User B’s invoice and the server returns a 200 OK with the invoice data, a generic scanner interprets this as a successful, valid request. It lacks the context to know that User A  should not  have access to that data. Reliance on manual testing (Burp Suite Repeater) for these checks introduces a bottleneck. As you move towards continuous deployment, you need a way to codify "User A accessing User B data" into a regression test that runs on every commit. The Root Cause: Context-Blind Authorization Under the hood, most web frameworks separate  Authentication  (Who are you?) from  Authorizat...