[GEMINI-HARDEN-04] Build an authenticated webhook runner instead of a print-only payload parser #436
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Parent epic: #432
Why
scripts/gitea_webhook_handler.pyis not yet a real webhook execution path. Today it parses a payload file, prints inferred event information, and leaves the high-risk parts as comments/examples.Before this becomes live automation, we need an authenticated, allowlisted bridge that is safe under adversarial input and aligned with repo policy.
Acceptance criteria
git pull, shell execution, or fleet mutation is triggered from untrusted payload fields.Related