<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Credential-Leakage — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/credential-leakage/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 04:17:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/credential-leakage/feed.xml" rel="self" type="application/rss+xml"/><item><title>PraisonAI GitHub Actions Credential Leakage Vulnerability (CVE-2026-40313)</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-artifact-leakage/</link><pubDate>Tue, 14 Apr 2026 04:17:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-artifact-leakage/</guid><description>PraisonAI versions 4.5.139 and below are vulnerable to credential leakage due to the ArtiPACKED attack, where GitHub Actions workflows using actions/checkout without persist-credentials: false write the GITHUB_TOKEN into the .git/config file, leading to potential exposure in uploaded artifacts and subsequent supply chain compromise.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, faces a critical vulnerability (CVE-2026-40313) in versions 4.5.139 and below. The vulnerability stems from the ArtiPACKED attack vector within GitHub Actions workflows. Specifically, the use of actions/checkout without setting <code>persist-credentials: false</code> causes the GITHUB_TOKEN to be written to the <code>.git/config</code> file. When subsequent workflow steps upload artifacts (build outputs, logs, test results, etc.), these tokens can be inadvertently included. Given that PraisonAI is a public repository, any user with read access can download these artifacts and extract the leaked tokens. Successful exploitation allows attackers to push malicious code, poison releases and PyPI/Docker packages, steal repository secrets, and ultimately compromise the entire supply chain, affecting all downstream users. The issue is present across multiple workflow and action files within the <code>.github/workflows/</code> and <code>.github/actions/</code> directories. Version 4.5.140 addresses and resolves this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains read access to the public PraisonAI GitHub repository.</li>
<li>Attacker identifies a GitHub Actions workflow that uploads artifacts.</li>
<li>The workflow uses <code>actions/checkout</code> without <code>persist-credentials: false</code>, causing the GITHUB_TOKEN to be written to <code>.git/config</code>.</li>
<li>The workflow uploads an artifact (e.g., build output, logs, test results) that includes the <code>.git/config</code> file.</li>
<li>Attacker downloads the artifact.</li>
<li>Attacker extracts the GITHUB_TOKEN from the <code>.git/config</code> file within the artifact.</li>
<li>Attacker uses the leaked GITHUB_TOKEN to authenticate to the PraisonAI repository.</li>
<li>Attacker leverages the compromised GITHUB_TOKEN to inject malicious code, poison releases/packages, steal secrets, or perform other malicious activities, leading to a supply chain compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40313 in PraisonAI versions 4.5.139 and below can result in a severe supply chain compromise. Attackers can inject malicious code into the PraisonAI repository, poison releases and associated packages (PyPI, Docker), and steal sensitive repository secrets. This can lead to widespread distribution of malware to downstream users of PraisonAI, compromising their systems and data. The vulnerability affects any user relying on PraisonAI and its distributed components.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI to version 4.5.140 or later to patch CVE-2026-40313.</li>
<li>Audit all GitHub Actions workflows in your organization to ensure that <code>actions/checkout</code> is used with <code>persist-credentials: false</code> to prevent credential leakage.</li>
<li>Monitor public repositories for inadvertently exposed configuration files containing credentials, and rotate potentially compromised tokens immediately.</li>
<li>Implement the Sigma rule &ldquo;Detect GitHub Workflow Artifact Containing Git Config&rdquo; to identify leaked git configurations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>credential-leakage</category><category>supply-chain</category><category>github-actions</category><category>cve-2026-40313</category></item></channel></rss>