By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk
News

Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk

News Room
Last updated: 2026/01/25 at 3:28 AM
News Room Published 25 January 2026
Share
Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk
SHARE

AWS recently published a security bulletin acknowledging a configuration issue affecting some popular AWS-managed open-source GitHub repositories. Dubbed CodeBreach, the critical vulnerability could have resulted in the introduction of malicious code and hijacking of the repositories leveraging AWS CodeBuild.

Wiz Security’s research team identified that a subset of repositories configured regular expressions for AWS CodeBuild webhook filters intended to limit trusted actor IDs, but these filters were insufficient, allowing a predictably acquired actor ID to gain administrative permissions. The four affected repositories that put the AWS Console supply chain at risk were the AWS SDK for JavaScript v3, the general-purpose cryptographic library aws-lc, amazon-corretto-crypto-provider, and awslabs/open-data-registry, a repository of publicly available datasets accessible from AWS resources.

Yuval Avrahami, vulnerability researcher at Wiz, and Nir Ohfeld, head of vulnerability research at Wiz, explain:

The vulnerability stemmed from a subtle flaw in how the repositories’ AWS CodeBuild CI pipelines handled build triggers. Just two missing characters in a Regex filter allowed unauthenticated attackers to infiltrate the build environment and leak privileged credentials.

The ACTOR_ID filter that checked which GitHub users could trigger builds was missing the start (^) and end ($) anchors, allowing any user ID containing a trusted ID as a substring to bypass the restriction. Because GitHub IDs are sequential, researchers created automated GitHub Apps and captured credentials from the build cache, gaining full admin access to the compromised repositories. As the AWS SDK for JavaScript is bundled with the AWS Console, a successful attack could have compromised the console supply chain for countless AWS accounts.

While confirming the vulnerability and thanking Wiz Security’s research team for identifying the issue, the cloud provider confirmed that no such misconfigurations exist across other AWS-managed open-source repositories. The issue in the affected repositories was mitigated within 48 hours of initial disclosure. Avrahami and Ohfeld add:

This issue follows a familiar pattern seen in recent supply-chain attacks like the Nx S1ngularity incident, where subtle CI/CD misconfigurations lead to disproportionately impactful attacks. Just last July, a threat actor abused a similar CodeBuild issue to launch a supply chain attack against users of the Amazon Q VS Code extension.

As similar attacks are becoming more prevalent, Wiz encourages organizations to harden their CI/CD pipelines, ensuring that any access controls using the ACTOR_ID filter are properly scoped and configured to allow only allow-listed identities. User hashkent comments on Reddit:

It feels like it’s getting harder to keep your source code secure. Getting scary out there.

This and other recent attacks highlight the importance of not allowing untrusted contributions to run privileged CI/CD pipelines. Corey Quinn, chief cloud economist at The Duckbill Group, comments:

This is the second major CodeBuild lapse in the past year. Something in the water over there? Pro tip: if AWS can’t configure their own security correctly, maybe double-check yours.

The CodeBreach vulnerability was initially reported by Wiz to AWS on August 25, with the cloud provider anchoring the vulnerable actor ID filters and revoking the personal access token of aws-sdk-js-automation on August 27. Additional hardening to prevent non-privileged builds from accessing project credentials via memory dumping was implemented in September, but public disclosure did not occur until January 15.

 

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google’s big change to the Android phone app prevents users from “flipping” out Google’s big change to the Android phone app prevents users from “flipping” out
Next Article Should we believe the crazy promises of Donut Lab and its miracle battery? Should we believe the crazy promises of Donut Lab and its miracle battery?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Focusrite Forte USB Audio Interface To Be Supported By Linux 7.0
Focusrite Forte USB Audio Interface To Be Supported By Linux 7.0
Computing
7 CarPlay Features Apple Recently Added To Your Vehicle – BGR
7 CarPlay Features Apple Recently Added To Your Vehicle – BGR
News
Meet ‘Amelia’: the AI-generated British schoolgirl who is a far-right social media star
Meet ‘Amelia’: the AI-generated British schoolgirl who is a far-right social media star
News
Linux Kernel Continuity Document Added: What Happens If Torvalds’ Git Repo Goes Away?
Linux Kernel Continuity Document Added: What Happens If Torvalds’ Git Repo Goes Away?
Computing

You Might also Like

7 CarPlay Features Apple Recently Added To Your Vehicle – BGR
News

7 CarPlay Features Apple Recently Added To Your Vehicle – BGR

8 Min Read
Meet ‘Amelia’: the AI-generated British schoolgirl who is a far-right social media star
News

Meet ‘Amelia’: the AI-generated British schoolgirl who is a far-right social media star

9 Min Read
Top 6 Personal Project Management Software in 2026
News

Top 6 Personal Project Management Software in 2026

19 Min Read
5 ways Video Boost keeps disappointing me on my Pixel 10 Pro
News

5 ways Video Boost keeps disappointing me on my Pixel 10 Pro

12 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?