Skip to content

cURL action to invoke attacker #2625

cURL action to invoke attacker

cURL action to invoke attacker #2625

name: cURL action to invoke attacker
on:
push:
workflow_dispatch:
schedule:
- cron: '15 13-21 * * 1-5'
jobs:
test-curl-action:
env:
gcp_project: "project1-366201"
region: "us-central1"
application_name: "embedded-my-tomcat-app"
PCC_SAN: "app0.cloud.twistlock.com"
PCC_API: ${{ secrets.PCC_API }}
PCC_KEY: ${{ secrets.PCC_KEY }}
PCC_SEC: ${{ secrets.PCC_SEC }}
service_account : "sample-google-cloud-run@project1-366201.iam.gserviceaccount.com"
workload_identity_provider: "projects/917516087101/locations/global/workloadIdentityPools/sample-google-cloud-run/providers/sample-google-cloud-run-provider"
# Add "id-token" with the intended permissions.
permissions:
contents: 'read'
id-token: 'write'
runs-on: ubuntu-latest
steps:
- name: Authenticate to Google Cloud for Deployment
id: 'gcp-auth'
uses: 'google-github-actions/auth@v1'
with:
workload_identity_provider: '${{env.workload_identity_provider}}'
service_account: '${{env.service_account}}'
- name: Update IAM policy for application invocation.
id: get-url
run: echo "APP_URL=$(gcloud run services describe ${{env.application_name}} --region ${{env.region}} --format='value(status.url)')" >> $GITHUB_OUTPUT
- name: "Curl to Application with evil data"
uses: indiesdev/curl@v1.1
id: api
with:
url: ${{ steps.get-url.outputs.APP_URL }}/hl7?data=ls%20-la&format=none
method: "GET"
accept: 200,500
log-response: true
timeout: 10000