Skip to content

Conversation

@jake-mahon
Copy link
Contributor

No description provided.

This workflow automatically scans all PRs that modify Knowledge Base files
(docs/kb/**/*.md, docs/kb/**/*.mdx) for potential customer data leakage.

Detection targets:
- Customer hostnames, FQDNs, and domains
- IP addresses and MAC addresses from customer infrastructure
- Customer email addresses and usernames
- Company/organization names
- Customer-specific file paths, URLs, and registry keys
- License keys, tokens, GUIDs, and SSH fingerprints
- Log snippets with identifiable data

The workflow uses Claude AI to analyze PR diffs and posts actionable
feedback directly to the PR, including specific line numbers and
remediation guidance.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>

- name: Run Claude KB Security Review
id: claude-security-review
uses: anthropics/claude-code-action@v1

Check warning

Code scanning / CodeQL

Unpinned tag for a non-immutable Action in workflow Medium

Unpinned 3rd party Action 'KB Security Review - Customer Data Leakage Detection' step
Uses Step: claude-security-review
uses 'anthropics/claude-code-action' with ref 'v1', not a pinned commit hash
…lined in Internet Engineering Task Force (IETF) RFC 6761
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants