The Trusted Resources verification system matches a resource source string (refSource.URI) against spec.resources[].pattern using Go's regexp.MatchString. In Go, regexp.MatchString reports a match if the pattern matches anywhere in the input string. As a result, common unanchored patterns—including examples found in Tekton documentation—can be bypassed by attacker-controlled source strings that contain the trusted pattern as a substring. This may cause an unintended policy match and alter which verification mode or keys are applied.
0133513db03dadb3cb08301d6b0330badcb63830pkg/trustedresources/verify.go:118–137 (getMatchedPolicies)An attacker can craft a Trusted Resources source string that embeds a trusted substring and still matches an unanchored VerificationPolicy spec.resources[].pattern, even if the policy is intended to constrain matches to a specific trusted source. This occurs because regexp.MatchString succeeds on substring matches. For example, a pattern such as https://github.com/tektoncd/catalog.git would match an attacker-controlled source like https://evil.com/?x=https://github.com/tektoncd/catalog.git.
Affected: Deployments using Trusted Resources verification with unanchored VerificationPolicy patterns, where an attacker can influence the refSource.URI value used for policy matching.
Not affected: Deployments that anchor all patterns (^...$) or otherwise enforce full-string matching; deployments where attackers cannot influence refSource.URI.
unzip -q -o poc.zip -d /tmp/poc-tekton-regex-001
cd /tmp/poc-tekton-regex-001/poc-F-TEKTON-REGEX-001
bash ./run.sh canonical | tee /tmp/tekton-regex-001-canonical.log
[CALLSITE_HIT] + [PROOF_MARKER]bash ./run.sh control | tee /tmp/tekton-regex-001-control.log
[CALLSITE_HIT] + [NC_MARKER]grep -n '\[PROOF_MARKER\]' /tmp/tekton-regex-001-canonical.log \
&& grep -n '\[NC_MARKER\]' /tmp/tekton-regex-001-control.log \
&& ! grep -n '\[PROOF_MARKER\]' /tmp/tekton-regex-001-control.log
It is recommended to make matching safe-by-default by requiring full-string matches, or by validating patterns and clearly documenting substring semantics. Possible approaches include:
pattern as ^(?:pattern)$ when not already anchored.A fix is considered accepted when, under the same harness, the canonical test still hits [CALLSITE_HIT] but does not emit [PROOF_MARKER].
Anchor all VerificationPolicy resource patterns so they must match the full source string. For example:
pattern: "^https://github\\.com/tektoncd/catalog\\.git$"
poc-F-TEKTON-REGEX-001/) to avoid collisions.canonical.log, control.log, witness.txt./poc/poc-F-TEKTON-REGEX-001/canonical.log, ./poc/poc-F-TEKTON-REGEX-001/control.log, ./poc/poc-F-TEKTON-REGEX-001/witness.txtshasum -a 256 for canonical.log, control.log, fix.patch, and test source against witness.txt.Note: If a supported integration uses verified HTTPS app-links or universal links only, provide the supported tag or branch and retesting on that pin can be arranged.
{
"github_reviewed": true,
"nvd_published_at": null,
"cwe_ids": [
"CWE-185"
],
"github_reviewed_at": "2026-04-21T16:25:19Z",
"severity": "MODERATE"
}