continual-learning
Warn
Audited by Socket on Apr 28, 2026
1 alert found:
AnomalyAnomaly.github/workflows/release-please.yml
LOWAnomalyLOW
.github/workflows/release-please.yml
The workflow file itself contains no malicious code. The main risk is a supply-chain/trust issue: it hands a write-capable token and repository write permissions to an external action (googleapis/release-please-action@v4). If that action or its dependencies are compromised, an attacker could use the token to modify repository contents or create malicious PRs/releases. Recommend: verify the external action's integrity (pin to a commit SHA), use the least-privilege token (or GITHUB_TOKEN), and restrict secret scopes. Overall, low probability of intentional maliciousness in this file, but a moderate supply-chain security risk due to granted privileges to an external action.
Confidence: 90%Severity: 60%
Audit Metadata