Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Deno’s Latest Update Adds OpenTelemetry Support

    Mayıs 31, 2025

    Neo browser reimagines search with built-in AI assistant

    Mayıs 27, 2025

    Google unveils AI Ultra subscription for power users

    Mayıs 27, 2025
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Unlock Desktop GPU Power with Asus ROG XG Station 3

      Mayıs 27, 2025

      OpenSilver Expands Cross-Platform Reach with iOS and Android Support

      Mayıs 27, 2025

      Introducing AMD’s 96-Core Threadripper 9000 CPUs: A New Era in Computing

      Mayıs 22, 2025

      AMD’s Radeon RX 9060 XT Delivers Better Value Than Nvidia’s RTX 5060 Ti

      Mayıs 22, 2025

      MSI’s Claw A8 Introduces AMD-Powered Gaming Handheld

      Mayıs 22, 2025
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » GitHub Hit by Cascading Supply Chain Attack Exposing CI/CD Secrets
    software

    GitHub Hit by Cascading Supply Chain Attack Exposing CI/CD Secrets

    By mustafa efeNisan 20, 2025Yorum yapılmamış2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A recent cascading supply chain attack has severely impacted GitHub Actions, putting tens of thousands of repositories at risk by exposing sensitive CI/CD secrets. The breach, which initially targeted the popular “tj-actions/changed-files” utility, has now been traced back to an earlier compromise of the “reviewdog/action-setup@v1” GitHub Action. This revelation has prompted concerns within the developer community about the vulnerabilities in the CI/CD ecosystem. Researchers discovered the malicious code injected into the tj-actions/changed-files utility, identified as CVE-2025-30066, just last week. The Cybersecurity and Infrastructure Security Agency (CISA) has since acknowledged the issue, highlighting the serious nature of the attack.

    The compromise allowed attackers to gain access to a wide range of sensitive data, including GitHub Personal Access Tokens (PATs), npm tokens, private RSA keys, and other critical access keys. This breach exposed the secrets within repositories using the compromised GitHub Actions, making it possible for attackers to misuse these secrets for malicious purposes. CISA has confirmed that the vulnerability has been patched in version 46.0.1 of the affected utility. However, the fact that the tj-actions/changed-files utility is employed in over 23,000 repositories means that the potential damage from this attack is vast, affecting a significant portion of the GitHub ecosystem.

    Further analysis by security researchers at Wiz has provided a clearer picture of how the attack unfolded. According to their findings, the initial compromise occurred in the v1 tag of the reviewdog/action-setup GitHub Action. This was followed by the injection of malicious code that was designed to capture and dump CI/CD secrets into log files. The attackers used this method to target personal access tokens (PATs), including the one used by the tj-actions system, which was then compromised. Wiz’s report suggests that the breach of reviewdog/action-setup likely served as the gateway for the larger attack on tj-actions/changed-files.

    The sophisticated nature of the attack cannot be understated. Attackers inserted a base64-encoded payload into an install script, which then exposed secrets from affected CI workflows in workflow logs. In repositories where the logs were publicly accessible, these secrets became vulnerable to theft, allowing malicious actors to exploit them. This breach underscores the significant risks associated with using third-party CI/CD tools and highlights the need for enhanced security measures to safeguard against such supply chain attacks within the open-source ecosystem.

    Post Views: 25
    java Programming Languages Software Development
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    mustafa efe
    • Website

    Related Posts

    Deno’s Latest Update Adds OpenTelemetry Support

    Mayıs 31, 2025

    Neo browser reimagines search with built-in AI assistant

    Mayıs 27, 2025

    Google unveils AI Ultra subscription for power users

    Mayıs 27, 2025
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2025 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.