oss-sec mailing list archives
Fwd: [siren] [Security Advisory] Active Exploitation of Weak GitHub Actions Configurations
From: Solar Designer <solar () openwall com>
Date: Tue, 3 Mar 2026 04:57:18 +0100
Also seen at https://lists.openssf-vuln.org/g/siren/message/6 ----- Forwarded message ----- From: "Christopher Robinson via lists.openssf-vuln.org" Date: Mon, 2 Mar 2026 09:13:33 -0500 Subject: [siren] [Security Advisory] Active Exploitation of Weak GitHub Actions Configurations To: siren () lists openssf-vuln org Resent-Date: Mon, 02 Mar 2026 07:08:17 -0800 Resent-From: christopher.robinson () linuxfoundation org Reply-To: siren () lists openssf-vuln org,christopher.robinson () linuxfoundation org Date: March 1, 2026 Severity: High – Active exploitation in the wild Overview An autonomous attack campaign, tracked as “hackerbot-claw,” is actively scanning public repositories for insecure GitHub Actions workflows and exploiting them to execute arbitrary code and exfiltrate credentials. The campaign has successfully compromised several high-profile open source projects by abusing common misconfigurations in GitHub Actions CI/CD pipelines. Attackers are targeting workflows that: - use privileged triggers such as pull_request_target, - execute untrusted code from forked pull requests, - include inline shell scripts or unvalidated inputs in workflow steps, - lack authorization checks before running workflows. A documented example involved project-akri/akri, where a malicious pull request added a direct shell-injection payload into a script without any safeguards. The project’s workflow then executed that modified script, triggering the attacker’s payload. This is an active, automated attack — not a theoretical vulnerability — and it’s ongoing across vulnerable open source repositories worldwide. The Linux Foundation is actively working with our projects to review this attack, eliminate any malicious files, and is seeking to put controls in place to stop these types of attacks from being successful in the future through strong repository security controls and monitoring. Attack Patterns Being Observed The bot employs multiple classes of exploitation techniques, including: - Direct script injection — an attacker modifies a script in a pull request so that when the workflow runs, the injected commands are executed with repository privileges. - “Pwn Request” / pull_request_target abuse — workflows that use privileged triggers and then check out untrusted code from pull requests execute that code with elevated access. - Branch or filename injection — malicious commands encoded into branch names or file paths are evaluated during workflow execution. These patterns lead to full code execution on GitHub runners and can result in credential leakage (e.g., exfiltration of GITHUB_TOKEN), unauthorized code pushes, and supply chain compromise. Recommended Mitigations Projects should take immediate action to defend against this active threat: 1. Review and Harden All GitHub Actions Workflows - Avoid pull_request_target triggers where possible; prefer pull_request, which runs on unprivileged tokens. - Do not check out untrusted code in privileged workflows — especially code from forks. - Limit workflow permissions to the minimum necessary (e.g., contents: read instead of write). - Pin third-party actions by commit hash to prevent tampering. 2. Sanitize All User Inputs - Do not directly interpolate user-controlled fields (titles, branch names, comments) into shell commands or actions without strict validation. - Extract untrusted inputs into environment variables and validate before use. 3. Add Authorization Checks - Only allow workflows to run on contributions from trusted collaborators (e.g., through author_association checks). 4. Use CI Security Scanners and Static Analysis - Integrate CodeQL or workflow linting tools to detect unsafe patterns automatically. 5. Rotate and Restrict Secrets - Rotate any tokens or secrets that may have been exposed or executed in workflows already. - Consider using short-lived credentials and OIDC federated authentication where feasible. 6. Monitor for Suspicious Activity - Enable audit logs and watch for unusual workflow triggers, unexpected token usage, or commits authored by bot accounts. Further Reading & Resources Maintainers can deepen their understanding of these issues and best practices at the following links: - GitHub’s official guidance on script injection risks <https://docs.github.com/en/actions/concepts/security/script-injections> and mitigation techniques. - OpenSSF’s overview of GitHub Actions attack vectors and recommendations <https://openssf.org/blog/2024/08/12/mitigating-attack-vectors-in-github-workflows> . - OpenSSF’s Source Code Management Best Practices Guide <https://best.openssf.org/SCM-BestPractices/> - Security guides on hardening Actions workflows <https://www.wiz.io/blog/github-actions-security-guide> (permissions, pinning, input sanitization). Summary This is an active exploitation campaign against GitHub Actions workflows that rely on permissive triggers and unvalidated input. All public and private repositories using GitHub Actions should immediately review, harden, and monitor their workflows to prevent compromise. The ongoing GitHub Actions exploitation campaign targets weaknesses that are explicitly addressed by the OpenSSF OSPS Baseline. Projects that implement OSPS-aligned controls — particularly least privilege automation, workflow review protections, and secure CI/CD configuration — materially reduce their exposure to automated supply chain attacks. Maintainers are strongly encouraged to assess their repositories against the OSPS Baseline and remediate any gaps as a priority. If you need help assessing your workflows or implementing mitigations, feel free to contact your project's security team for assistance. Additional OSPS-Aligned Mitigation Guidance The OpenSSF OSPS Baseline directly reduces exposure to modern supply chain attacks by enforcing least-privilege automation, protected CI/CD workflows, mandatory peer review for security-sensitive changes, and disciplined secrets management. The ongoing GitHub Actions exploitation campaign demonstrates that attackers increasingly target weak repository settings rather than software bugs themselves. Projects aligned with the OSPS Baseline materially shrink their attack surface, limit credential exposure, and prevent unauthorized workflow execution — transforming CI/CD from a liability into a controlled and auditable security boundary. Projects that implement the OpenSSF Open Source Project Security (OSPS) Baseline are significantly more resilient to this class of GitHub Actions exploitation. The controls below align directly with OSPS expectations and address the attack patterns observed in this campaign. 1. Enforce Least Privilege in Automation - Restrict GITHUB_TOKEN to the minimum required permissions (default to contents: read). - Disable write permissions for workflows triggered by pull requests from forks. - Separate unprivileged CI testing workflows from privileged release or deployment workflows. - Use short-lived credentials (e.g., OIDC) instead of long-lived secrets where possible. OSPS alignment: Automation must follow least privilege and restrict credential exposure. 2. Harden CI/CD Workflow Configuration - Avoid using pull_request_target unless absolutely required. - Never check out and execute untrusted forked code in privileged workflows. - Require maintainer approval before running workflows from external contributors. - Pin third-party GitHub Actions by commit SHA. OSPS alignment: Build and release processes must be secured and protected from unauthorized modification. 3. Protect Workflow Files and Critical Infrastructure Code - Require code review for all changes to .github/workflows/*. - Use CODEOWNERS to enforce additional scrutiny on CI configuration changes. - Require at least one trusted maintainer review before merging changes to automation. OSPS alignment: Security-sensitive changes must undergo peer review and access control enforcement. 4. Prevent Script Injection - Do not interpolate user-controlled inputs (branch names, PR titles, comments) directly into shell commands. - Validate and sanitize inputs before use. - Prefer reviewed scripts over inline shell blocks in workflow YAML. OSPS alignment: Secure development practices must prevent injection and unsafe input handling. 5. Monitor and Prepare for Incident Response - Enable repository audit logging. - Monitor for unexpected workflow executions or token usage. - Rotate any potentially exposed credentials immediately. - Maintain a documented incident response process and public security contact. OSPS alignment: Projects must be prepared to detect, respond to, and recover from security incidents. TLP:CLEAR -- Christopher "CRob" Robinson *OpenSSF* <https://www.openssf.org> , *The Linux Foundation* <https://www.linuxfoundation.org> Chief Technology Officer, Chief Security Architect Github <https://github.com/SecurityCRob> | LinkedIn <https://www.linkedin.com/in/darthcrob> | CRob's Office Hours <https://calendar.app.google/uMvtAfGgYd39fLtk7> ----- End forwarded message -----
Current thread:
- Fwd: [siren] [Security Advisory] Active Exploitation of Weak GitHub Actions Configurations Solar Designer (Mar 02)
