How Did a GitHub Action Compromise Impact Thousands of Repositories?

Article Highlights
Off On

A significant security incident has rocked the software development community, specifically targeting GitHub Actions. This breach, identified as CVE-2025-30066, was a supply chain attack affecting over 23,000 code repositories. At its core, this attack involved the GitHub Action known as tj-actions/changed-files, which enabled attackers to leak critical secrets like passwords from public repositories. The incident underscores the vulnerability of public repositories in the software supply chain and the importance of rigorous security practices.

The Attack Unveiled

The compromise began with malicious actors introducing a harmful commit into the popular tj-actions/changed-files GitHub Action. This commit contained a Node.js function with base64-encoded instructions that downloaded a malicious Python script. The script’s purpose was to scan the GitHub Runner’s memory, hunting for sensitive information such as passwords and other credentials crucial for CI/CD processes.

These secrets, found in GitHub Runner’s memory, were subsequently printed in the build logs of the compromised Action. Because these logs were publicly accessible, anyone with the right access could retrieve the exposed information. Varun Sharma of StepSecurity emphasized the ease with which these exposed secrets could be exploited if the logs were public. The ability to expose vital credentials made the attack particularly dangerous, affecting numerous public repositories and highlighting the significant flaw in the system’s design.

Discovering the Compromise

StepSecurity played a pivotal role in detecting the breach, tracing the malicious activity back to mid-March. Cybersecurity firm Sysdig supported these findings, unraveling how the Node.js function decoded the payload to fetch additional Python code from a GitHub gist. This code mapped the GitHub Runner’s memory, used regular expressions to search for credentials, and logged the extracted secrets. GitHub’s prompt response involved deactivating the compromised Action to prevent further data leaks.

The token allowed privileged access to targeted repositories, prompting repository maintainers to revoke the PAT, update the bot’s password, restrict permissions, and enforce passkey requirements. This chain of events highlighted the importance of securing personal access tokens, as their compromise can lead to extensive operational disruptions and sensitive data exposure.

Broad Impact on Repositories

Researchers from Wiz pointed out that the primary threat affected public repositories due to the accessibility of logs and secrets. Numerous repositories, including those of large organizations, had secrets such as AWS access keys and GitHub Personal Access Tokens compromised. This highlighted the wide-reaching impact and the vulnerability of public repositories to such attacks. The exposure of these credentials posed a significant risk since they could be used to gain unauthorized access to additional systems and data.

Dimitri Stiliadis from Endor Labs speculated that the attackers had broader motives than just accessing secrets. He suggested that the ultimate goal might have been to compromise the software supply chain for other open-source libraries and artifacts, posing a potential risk to thousands of packages involved in public repository CI pipelines. This aspect of the attack emphasizes the interconnected nature of software development repositories and the cascading effects a single compromise can have on the broader ecosystem.

Strengthening Security Measures

A significant security incident has sent shockwaves through the software development community, specifically targeting GitHub Actions. This breach, cataloged as CVE-2025-30066, was a supply chain attack impacting more than 23,000 code repositories. At the heart of this attack was the GitHub Action known as tj-actions/changed-files. This vulnerability allowed attackers to seamlessly leak critical secrets such as passwords from public repositories. This incident highlights the vulnerabilities public repositories face in the software supply chain and emphasizes the necessity of stringent security protocols.

The breach’s extent reveals that even widely trusted tools can harbor flaws, pointing to the growing need for developers and organizations to prioritize security at every level from development to deployment. Ensuring that security parameters are strictly enforced can help mitigate such risks. The software development community must take this incident as a wake-up call and adopt more rigorous measures to protect against similar threats in the future.

Explore more

Omantel vs. Ooredoo: A Comparative Analysis

The race for digital supremacy in Oman has intensified dramatically, pushing the nation’s leading mobile operators into a head-to-head battle for network excellence that reshapes the user experience. This competitive landscape, featuring major players Omantel, Ooredoo, and the emergent Vodafone, is at the forefront of providing essential mobile connectivity and driving technological progress across the Sultanate. The dynamic environment is

Can Robots Revolutionize Cell Therapy Manufacturing?

Breakthrough medical treatments capable of reversing once-incurable diseases are no longer science fiction, yet for most patients, they might as well be. Cell and gene therapies represent a monumental leap in medicine, offering personalized cures by re-engineering a patient’s own cells. However, their revolutionary potential is severely constrained by a manufacturing process that is both astronomically expensive and intensely complex.

RPA Market to Soar Past $28B, Fueled by AI and Cloud

An Automation Revolution on the Horizon The Robotic Process Automation (RPA) market is poised for explosive growth, transforming from a USD 8.12 billion sector in 2026 to a projected USD 28.6 billion powerhouse by 2031. This meteoric rise, underpinned by a compound annual growth rate (CAGR) of 28.66%, signals a fundamental shift in how businesses approach operational efficiency and digital

du Pay Transforms Everyday Banking in the UAE

The once-familiar rhythm of queuing at a bank or remittance center is quickly fading into a relic of the past for many UAE residents, replaced by the immediate, silent tap of a smartphone screen that sends funds across continents in mere moments. This shift is not just about convenience; it signifies a fundamental rewiring of personal finance, where accessibility and

European Banks Unite to Modernize Digital Payments

The very architecture of European finance is being redrawn as a powerhouse consortium of the continent’s largest banks moves decisively to launch a unified digital currency for wholesale markets. This strategic pivot marks a fundamental shift from a defensive reaction against technological disruption to a forward-thinking initiative designed to shape the future of digital money. The core of this transformation