GitHub Supply Chain Attack Exposes Secrets in 160,000 Projects

Recent developments in cybersecurity have brought to light a severe supply chain attack on GitHub Actions. This attack, initiated through a compromised SpotBugs personal access token (PAT), has highlighted vulnerabilities within interconnected software dependencies. The breach led to the exposure of secrets in an estimated 160,000 projects, sparking concerns about the security of CI/CD pipelines and the management of tokens. The intrusion, first detected in March 2025, underscores the need for heightened security measures to protect sensitive information in open-source projects.

The Attack’s Genesis

Exploitation of SpotBugs Token

In March 2025, threat actors exploited a compromised SpotBugs personal access token (PAT) to target the tj-actions/changed-files GitHub action. This compromised token, stolen via a malicious pull request that exploited GitHub Actions’ pull_request_target trigger, allowed attackers to access secrets and initiate the attack. The attacker utilized this access to alter the code of the targeted action, injecting malicious activity aimed at dumping CI/CD secrets into build logs. Initially, the attack focused on an open-source project by Coinbase. However, it soon expanded to impact all projects utilizing the compromised action.

Widespread Impact

As the attack spread, approximately 160,000 projects were affected, with around 218 repositories exposing secrets. Palo Alto Networks conducted an investigation that traced the root cause back to the compromise of a SpotBugs maintainer’s PAT. The malicious pull request initiated the sequence of events that led to the attacker gaining significant access. Following the initial compromise, the attacker invited a user with write access to SpotBugs repositories, facilitating the injection of a malicious GitHub Actions workflow file. This workflow file hijacked and encrypted secrets using asymmetric encryption, making them readable only to the attacker.

Methodologies and Consequences

Further Misuse and Propagation

The leaked secrets were further misused to override the v1 tag in the reviewdog/action-setup repository. This override impacted users reliant on this tag, including tj-actions/eslint-changed-files action users. Consequently, the attack extended to the tj-actions/changed-files action, leading to its execution by Coinbase’s workflow. During this execution, a token with write permissions was exposed, allowing the attacker to replace vulnerable workflows. Despite immediate measures to remove the compromised workflow, the attackers continued to replace all tags with malicious commits, jeopardizing every GitHub workflow dependent on the tj-actions/changed-files action.

Underlying Vulnerabilities

The investigation highlighted critical vulnerabilities within interconnected software dependencies in supply chains. GitHub workflows, deeply reliant on these dependencies, found themselves compromised, reinforcing the need for securing access tokens and secrets against sophisticated threats. Reviewdog and SpotBugs maintainers worked collaboratively with Palo Alto Networks to confirm the progression and impact of the attack. Enhanced security measures were deemed imperative to safeguard secrets in CI/CD pipelines and dependency management.

Addressing the Threat

Security Measures and Best Practices

The supply chain attack on GitHub Actions illuminated the urgent need for robust security protocols to defend against similar threats. Organizations must prioritize securing personal access tokens and implementing stringent procedures for handling secrets. Best practices include regular audits and reviews of GitHub workflows to identify and rectify potential vulnerabilities. Employing tools that offer real-time monitoring and automated responses to threats can help mitigate risks effectively.

Future Considerations

Long-term strategies should encompass developing secure coding practices, fostering a culture of cybersecurity awareness, and leveraging advanced encryption techniques to protect sensitive information. Continuous improvement in security measures, alongside collaborative efforts from the cybersecurity community, can thwart attempts to exploit interconnected software dependencies. The incident serves as a crucial reminder that vigilance and proactive measures are essential in safeguarding the integrity of open-source projects.

Lessons Learned

Importance of Security in Interconnected Systems

The GitHub Actions supply chain attack underscores the critical importance of securing interconnected systems and dependencies. It demonstrated how vulnerabilities in one component could propagate across multiple projects, emphasizing the necessity for a holistic approach to cybersecurity. Enhanced vigilance in monitoring, timely responses to threats, and comprehensive audits remain pivotal in preventing such breaches.

Collaborative Efforts in Cybersecurity

Recent advancements in cybersecurity have revealed a significant supply chain attack on GitHub Actions. This breach was instigated through a compromised SpotBugs personal access token (PAT) and has exposed critical vulnerabilities within interconnected software dependencies. The attack led to the exposure of sensitive secrets across approximately 160,000 projects, raising serious concerns about the security of continuous integration and continuous deployment (CI/CD) pipelines and the proper management of tokens. First detected in March 2025, this intrusion has underscored the urgent need for enhanced security protocols to safeguard sensitive information in open-source projects. As open-source collaboration increases, the protection of CI/CD pipelines becomes paramount to maintaining the integrity and security of software development processes. Developers are now urged to adopt stricter security measures and to audit their token management practices regularly. The incident serves as a stark reminder of the persistent risks in the cybersecurity landscape and the need for continuous vigilance.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later