A static analysis tool that finds security vulnerabilities and misconfigurations in GitHub Actions workflows.
zizmor is a static analysis tool for GitHub Actions that scans workflow files to identify security vulnerabilities and misconfigurations. It helps prevent common issues like template injection attacks, credential leaks, excessive permissions, and supply chain threats in CI/CD pipelines.
Developers, DevOps engineers, and security teams who use GitHub Actions for CI/CD and want to improve their workflow security posture.
zizmor provides specialized, actionable security analysis for GitHub Actions workflows that general-purpose linters miss, helping teams catch vulnerabilities before they reach production.
Static analysis for GitHub Actions
Identifies vulnerabilities that could allow attacker-controlled code execution in workflows, a core feature highlighted in the README's key points.
Finds accidental credential persistence and leakage risks in action configurations, helping prevent secrets exposure as specified in the feature list.
Flags excessive permission scopes and credential grants to runners, reducing attack surface by limiting unnecessary access, per the README's security focus.
Covers a wide range of GitHub Actions-specific security issues, with detailed documentation linked for various audits and recipes.
Exclusively targets GitHub Actions, making it useless for teams using other CI/CD tools like Azure DevOps or CircleCI, despite its thoroughness.
Cannot detect runtime vulnerabilities or issues that emerge during workflow execution, requiring complementary tools for full coverage.
Requires installation via crates.io or package managers, and integrating into pipelines may add overhead, as indicated by the separate installation documentation.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.