From 521d069da7c8c2f78e2964e041c7d6fff78bf9d8 Mon Sep 17 00:00:00 2001 From: Ashwin Bhat Date: Mon, 6 Oct 2025 09:51:50 -0700 Subject: [PATCH] docs: add prompt injection security note (#604) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * docs: add prompt injection security note Add warning about potential hidden markdown in untrusted content from external contributors. Documents existing sanitization measures while acknowledging new bypass techniques may emerge. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude * Update docs/security.md Co-authored-by: David Dworken * format --------- Co-authored-by: Claude Co-authored-by: David Dworken --- docs/security.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/docs/security.md b/docs/security.md index e23429b..23444f5 100644 --- a/docs/security.md +++ b/docs/security.md @@ -13,6 +13,10 @@ - **No Cross-Repository Access**: Each action invocation is limited to the repository where it was triggered - **Limited Scope**: The token cannot access other repositories or perform actions beyond the configured permissions +## ⚠️ Prompt Injection Risks + +**Beware of potential hidden markdown when tagging Claude on untrusted content.** External contributors may include hidden instructions through HTML comments, invisible characters, hidden attributes, or other techniques. The action sanitizes content by stripping HTML comments, invisible characters, markdown image alt text, hidden HTML attributes, and HTML entities, but new bypass techniques may emerge. We recommend reviewing the raw content of all input coming from external contributors before allowing Claude to process it. + ## GitHub App Permissions The [Claude Code GitHub app](https://github.com/apps/claude) requires these permissions: