Back to the blog

Supply chain attack affecting multiple GitHub actions

On March 14, 2025, attackers compromised a popular GitHub action, injecting malicious code to expose sensitive CI/CD secrets within workflow logs.

What Happened?

On March 14, 2025, attackers compromised the popular GitHub Action tj-actions/changed-files, injecting malicious code to expose sensitive CI/CD secrets within workflow logs. This supply chain attack affected a total of 218 repositories, posing significant security risks despite its relatively limited scope.

‍

Attack Methodology

  • Attackers leveraged a compromised GitHub Personal Access Token (PAT) from a separate supply chain attack on the GitHub Action reviewdog/action-setup@v1.
  • Malicious code introduced into tj-actions/changed-files dumped CI/CD secrets (GitHub tokens, DockerHub credentials, npm tokens, AWS credentials) into publicly accessible workflow logs.
  • Many compromised repositories inadvertently exposed secrets because workflow logs were configured to be publicly accessible.

‍

Impact

  • 218 repositories across multiple organizations publicly exposed sensitive secrets.
  • Short-lived GitHub tokens had limited exploitation potential due to quick expiration but other credentials (DockerHub, npm, AWS) posed serious and lasting security risks.
  • Potential for further downstream supply chain attacks due to compromised popular repositories.

‍

Recommended Actions

  • Immediate Credential Rotation: Rotate any secrets exposed by the affected GitHub Actions immediately, especially high-risk credentials (DockerHub, npm, AWS).
  • Log Security: Ensure workflow logs are not publicly accessible and monitor logs for suspicious activity or unauthorized access.
  • Pin GitHub Actions: Use commit SHA hashes rather than mutable tags for referencing GitHub Actions to prevent future supply chain attacks.
  • Dependency Review: Regularly audit GitHub Actions dependencies and enable automated tools like Dependabot to identify and update vulnerable components promptly.
  • Security Best Practices: Review and implement GitHub's recommended security hardening measures for Actions workflows.

‍

References

Related posts

Report

Debunking the "stupid user" myth
in security

Exploring the influence of employees’ perception
and emotions on security behaviors