• Advertise
  • Support Center
Wednesday, June 18, 2025
  • Login
  • Register
INNOCENT MICHAEL
  • HOME
  • BROWSE
    • WATCHVIDEOS
    • BREAKING NEWSUPDATES
      • BROWSE
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
      • USA NEWS
        • Browse News
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
      • CANADA NEWS
        • Browse News
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
      • UK NEWS
        • Browse News
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
      • NIGERIA NEWS
        • Browser News
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
    • CYBERSECURITY
    • REDCARPET CHRONICLE
    • POLITICSNEWS
      • BROWSE
      • POLITICS NEWS (CA)
      • POLITICS NEWS (USA)
      • POLITICS NEWS (UK)
    • SPORTS
      • AEW
      • WWE
  • SHOP
    • Browse Shop
  • QUICK LINKS
  • LEGAL HUB
Live TV Indicator
WATCH ONLINE TV
No Result
View All Result
INNOCENT MICHAEL
  • HOME
  • BROWSE
    • WATCHVIDEOS
    • BREAKING NEWSUPDATES
      • BROWSE
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
      • USA NEWS
        • Browse News
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
      • CANADA NEWS
        • Browse News
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
      • UK NEWS
        • Browse News
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
      • NIGERIA NEWS
        • Browser News
        • Local News
        • Breaking News
        • Society & Culture
        • Crisis & Controversy
        • Economy & Markets
        • Tech & Innovation
    • CYBERSECURITY
    • REDCARPET CHRONICLE
    • POLITICSNEWS
      • BROWSE
      • POLITICS NEWS (CA)
      • POLITICS NEWS (USA)
      • POLITICS NEWS (UK)
    • SPORTS
      • AEW
      • WWE
  • SHOP
    • Browse Shop
  • QUICK LINKS
  • LEGAL HUB
  • Login
  • Register
No Result
View All Result
INNOCENT MICHAEL
Home Tech Apps
GitHub Action Supply Chain Hack Exposes Dev Secrets

GitHub Action Supply Chain Hack Exposes Dev Secrets

March 21, 2025
in Apps, Tech
0
Share on FacebookShare On Whatsapp

The GitHub ecosystem has faced a serious wake-up call. A recent supply chain attack involving the widely-used GitHub Action tj-actions/changed-files exposed sensitive secrets across at least 218 repositories. While that’s a small percentage of the 23,000+ projects that rely on this action, the security implications are still deeply concerning—especially when many of the affected repositories are highly popular.

GitHub Action Supply Chain Hack Exposes Dev Secrets

What Happened in the GitHub Supply Chain Breach?

On March 14, 2025, attackers added a malicious commit to tj-actions/changed-files. The injected code captured and dumped CI/CD secrets from the GitHub Runner Worker into the workflow logs. If these logs were set to public—which many projects do for transparency—anyone could access and read those secrets.

This malicious injection was likely made possible by a compromised GitHub personal access token (PAT). That PAT was associated with another action, reviewdog/action-setup@v1, which is believed to have been the original point of compromise in a chained supply chain attack.

GitHub Action Supply Chain Hack Exposes Dev Secrets

Why This Attack Matters

Even though only 218 repositories confirmed secret leakage, the blast radius is massive. Endor Labs tracked the exposure window between March 14, 4:00 PM UTC, and March 15, 2:00 PM UTC. In that period, 5,416 repositories used the compromised action, and 614 of those executed it at least once.

Of those, 218 printed secrets directly into their logs. Many others avoided disaster by following best practices, such as referencing a commit SHA instead of a mutable version tag.

What Kind of Secrets Were Exposed?

The exposed credentials varied by project, but the most commonly leaked secrets included:

  • GitHub Install Access Tokens
  • AWS Credentials
  • npm Tokens
  • DockerHub Access Keys

While GitHub tokens typically expire within 24 hours, tokens for third-party services like AWS could remain valid unless manually rotated—leaving systems vulnerable to follow-up attacks.

Supply Chain Risks Beyond GitHub

What makes this attack especially alarming is its demonstration of how fragile the software supply chain really is. One weak link in the form of a single compromised action or token can quickly cascade into widespread exposure.

There are still unanswered questions about how many other GitHub Actions might have been compromised through the reviewdog breach. Security teams are now investigating if additional GitHub repositories were silently affected beyond those identified.

Lessons for DevOps and Security Teams

Developers using GitHub Actions should act quickly:

  • Rotate All Secrets Immediately: Especially if your project used the compromised action during the exposure window.
  • Avoid Mutable Tags: Always reference GitHub Actions by their specific commit SHA.
  • Limit Workflow Permissions: Minimize what actions can access within your CI/CD pipeline.
  • Restrict Workflow Logs: Keep them private to prevent unintended credential exposure.
  • Adopt GitHub’s Hardening Guidelines: Follow security best practices outlined by GitHub to safeguard your workflows.

Protecting CI/CD Pipelines from Supply Chain Attacks

This incident reinforces the importance of continuous security auditing. Dependencies and third-party tools—especially in CI/CD pipelines—must be treated as potential attack vectors.

Many open-source developers rely on trust when pulling in GitHub Actions. However, the reviewdog and tj-actions compromise proves that even trusted packages can be turned malicious.

Organizations must invest in pipeline observability, automated secret scanning, and immediate alerting systems to respond swiftly to similar events.

GitHub Action Supply Chain Hack Exposes Dev Secrets

A Glimpse Into Attacker Strategy

Attackers likely targeted projects with high GitHub star counts, forks, or visibility. Endor Labs discovered some repositories involved had over 350,000 stars and 60,000+ forks. The goal? Use these popular repos to spread compromised artifacts or dependencies downstream in a larger supply chain attack strategy.

If successful, such a campaign could reach thousands of end-users indirectly.

Share1SendTweet1ShareShare

Related Posts

The UK’s phone theft crisis is a wake-up call for digital security
Hackers

The UK’s phone theft crisis is a wake-up call for digital security

April 19, 2025
29
7 Clever Ways to Reuse Your Old Windows 10 PC
Tech

7 Clever Ways to Reuse Your Old Windows 10 PC

April 19, 2025
12
Why I Auto-Backup Photos to Proton Drive (5 Strong Reasons)
Data Security

Why I Auto-Backup Photos to Proton Drive (5 Strong Reasons)

April 10, 2025
33
Tor Browser 14.0.8: Urgent Security Update for Windows Users
Apps

Tor Browser 14.0.8: Urgent Security Update for Windows Users

April 1, 2025
24
Rooted Phones 3.5x More Likely to Face Cyber Attacks
Tech

Rooted Phones 3.5x More Likely to Face Cyber Attacks

March 23, 2025
18
Introducing AI Summarization for Notepad in Windows 11
AI

Introducing AI Summarization for Notepad in Windows 11

March 13, 2025
13
Subscribe
Login
Notify of
guest
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
video
play-rounded-fill

Stay Updated

Subscribe to our newsletter and be the first to receive updates, tips, and exclusive offers straight to your inbox.

Haysuite Haysuite Haysuite
The UK’s phone theft crisis is a wake-up call for digital security
Hackers

The UK’s phone theft crisis is a wake-up call for digital security

April 19, 2025
29
7 Clever Ways to Reuse Your Old Windows 10 PC
Tech

7 Clever Ways to Reuse Your Old Windows 10 PC

April 19, 2025
12
8 Proven Ways to Clear Clipboard on Windows 11 Safely
Windows

8 Proven Ways to Clear Clipboard on Windows 11 Safely

April 18, 2025
17
What to Do When Ransomware Hits: Pay or Prepare?
Ransomware

What to Do When Ransomware Hits: Pay or Prepare?

April 18, 2025
13
Meta Resumes EU AI Training: Why Europe’s Data Matters
AI

Meta Resumes EU AI Training: Why Europe’s Data Matters

April 16, 2025
23

© 2024 Innocent Michael Network Inc..

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Login
  • Sign Up
Live TV Indicator
WATCH ONLINE TV
  • HOME
  • BROWSE
    • WATCH
    • BREAKING NEWS
      • BROWSE
      • USA NEWS
      • CANADA NEWS
      • UK NEWS
      • NIGERIA NEWS
    • CYBERSECURITY
    • REDCARPET CHRONICLE
    • POLITICS
      • BROWSE
      • POLITICS NEWS (CA)
      • POLITICS NEWS (USA)
      • POLITICS NEWS (UK)
    • SPORTS
      • AEW
      • WWE
  • SHOP
    • Browse Shop
  • QUICK LINKS
  • LEGAL HUB
CUSTOMER LOGIN

Copyright © 2024 INNOCENT MICHAEL NETWORK INC.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply