Tag
Gemini CLI Remote Code Execution via Workspace Trust and Tool Allowlisting Bypasses
2 rules 1 TTPGemini CLI is vulnerable to remote code execution via workspace trust and tool allowlisting bypasses, impacting headless mode and GitHub Actions workflows.
PraisonAI GitHub Actions Credential Leakage Vulnerability (CVE-2026-40313)
2 rules 2 TTPs 1 CVEPraisonAI versions 4.5.139 and below are vulnerable to credential leakage due to the ArtiPACKED attack, where GitHub Actions workflows using actions/checkout without persist-credentials: false write the GITHUB_TOKEN into the .git/config file, leading to potential exposure in uploaded artifacts and subsequent supply chain compromise.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 1 TTPThe trivy-action GitHub Action was compromised via git tag repointing, where 76 of 77 release tags were retroactively poisoned, leading to a multi-stage credential theft operation discovered following a spike in script execution detections on Linux runners.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 1 TTPThe aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting malicious code into the entrypoint.sh script to steal credentials from CI/CD pipelines before executing the legitimate Trivy scanner.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 2 TTPsThe trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.
act Project Cache Poisoning Vulnerability Leads to Potential RCE
2 rules 1 TTP 1 CVEA vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 1 TTPThe aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting a multi-stage credential stealer into CI/CD pipelines, allowing for the theft of secrets and credentials.
Compromised trivy-action GitHub Action Enables Credential Theft
2 rules 1 TTPThe trivy-action GitHub Action was compromised via git tag repointing, with attackers poisoning 76 of 77 release tags to inject a multi-stage credential stealer before the legitimate scanner runs, granting attackers access to CI/CD pipeline secrets.
Langflow GitHub Actions Shell Injection Vulnerability
2 rules 2 TTPs 1 IOCUnauthenticated remote shell injection vulnerability exists in Langflow GitHub Actions workflows prior to version 1.9.0, enabling attackers to execute arbitrary shell commands via malicious branch names or pull request titles due to unsanitized GitHub context variable interpolation, leading to potential secret exfiltration and supply chain compromise.
TeamPCP Compromise of KICS GitHub Action Supply Chain
2 rules 4 TTPsTeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.
Trivy Security Scanner GitHub Actions Tag Hijacking for CI/CD Secret Theft
2 rules 4 TTPsAttackers hijacked 75 tags associated with the Trivy Security Scanner GitHub Actions to steal CI/CD secrets from users of the compromised tags.
Execution via GitHub Actions Runner
3 rules 3 TTPsAdversaries compromising GitHub Actions workflows can execute arbitrary commands on runner hosts, leading to code execution, reconnaissance, credential harvesting, or network exfiltration.