GeistHaus
log in · sign up

GitHub Action tj-actions/changed-files supply chain attack | Wiz Blog

wiz.io

A supply chain attack on GitHub Action tj-actions/changed-files caused many repositories to leak their secrets.

8 pages link to this URL
Detecting CI/CD Supply Chain Attacks with Canary Credentials | Tracebit

A single threat actor - TeamPCP - compromised a chain of widely-used open source tools: Trivy, KICS, LiteLLM, and Telnyx. This post looks at the campaign and explores the question: once you've pinned your actions and hardened your runners, what actually detects credential exfiltration from a compromised CI/CD pipeline?

1 inbound link website en
Zombie Workflows: A GitHub Actions horror story

Our research team recently discovered an exploitable pattern in GitHub Actions that lets attackers exploit seemingly fixed vulnerabilities.

2 inbound links website en GitHub ActionsCI/CD securityworkflow securitysoftware supply chain securitypull_request_targetPwn RequestssecretsGITHUB_TOKENleast privilegebranch protectioncode verificationcode quality and securitySonarQube