By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Compromised GitHub Action Highlights Risks in CI/CD Supply Chains
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Compromised GitHub Action Highlights Risks in CI/CD Supply Chains
News

Compromised GitHub Action Highlights Risks in CI/CD Supply Chains

News Room
Last updated: 2025/04/16 at 11:40 AM
News Room Published 16 April 2025
Share
SHARE

A popular GitHub Action used by thousands of repositories recently compromised those repositories, exposing a critical weakness in how open-source Actions are published and consumed. 

A new maintainer briefly hijacked the tj-actions/changed-files Action by publishing a version that contained obfuscated, malicious code. This triggered concern within the developer community about CI/CD security in the GitHub Actions ecosystem.

The incident highlights an emerging attack surface: the supply chain of Actions themselves. While most guidance focuses on hardening the workflow environment, few teams scrutinize the security of the Actions they import. This breach has prompted renewed calls for best practices such as Action pinning, third-party audits, and hardened runners.

Repositories widely used the tj-actions/changed-files Action to detect file changes in pull requests — a common step in conditional CI workflows. In March 2025, a new maintainer introduced a version (v44) that included obfuscated shell commands capable of remote code execution. While the malicious release was short lived, it bypassed detection long enough to expose a blind spot in how many developers trust and consume GitHub Actions.

The breach came to light when users noticed that the action’s new version included an obfuscated curl | bash pattern – considered a red flag for remote script execution. StepSecurity analyzed the payload and confirmed that it could exfiltrate sensitive data from GitHub-hosted runners. The malicious payload was quickly removed and the repository restored. The incident prompted widespread audits and temporary workflow suspensions across impacted projects.

The compromised Action is notable not just because of its popularity – over 20,000 repositories are estimated to have used it – but because it revealed a broader ecosystem weakness. Devs often treat GitHub Actions as trusted building blocks, yet unlike packages or containers, Actions lack strong controls around publishing, ownership changes, or signature verification.

Security researchers and open-source maintainers quickly shared mitigations. StepSecurity recommends pinning all third-party Actions to specific SHAs to ensure reproducibility and protect against tampering. They also suggested hardening GitHub-hosted runners by limiting outbound network access, scoping environment variables tightly, and reducing unnecessary permissions. The incident has also prompted some developers to take proactive action – scanning their workflows for unpinned dependencies and auditing the workflows they rely upon.

Beyond individual repositories, the incident has reignited a broader discussion around supply chain security in CI/CD with concerns raised in developer forums and deeper analysis emerging from industry research exploring the potential blast radius of the attack. While many teams focus on securing their application code – including practices like dependency scanning and static analysis – CI/CD tooling can be less scrutinized. GitHub Actions in particular run with high privileges, capable of signing releases, pushing images, or deploying to production. A compromised Action can subvert an entire delivery pipeline. While StepSecurity did not quantify how widespread the practice of using unpinned Actions was, they have often emphasized the risks of their use and recommended treating them with caution. 

The compromise echoes similar issues in adjacent ecosystems, such as malicious NPM packages or trojanized Docker Images. While the industry is making progress through initiatives like SLSA, Sigstore and SBOM tooling, GitHub Actions still lack first-class support for provenance, sandboxing, or trust enforcement on reusable Actions.

As scrutiny of the GitHub Actions ecosystem grows, some engineering teams are beginning to formalize how they assess and adopt third-party automation tools, defining internal standards for trusted Actions and conducting reviews before integration. This kind of guardrail-based approach, as seen at organizations like Salesforce, reflects a broader shift toward treating CI/CD infrastructure with the same care and governance long applied to application dependencies and hints at where the ecosystem may be heading.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article I spent a day playing the Switch 2 and Nintendo has answered all my biggest concerns
Next Article WORLD3 Unleashes Revolutionary AI Agent Portal and Agent Influencer Campaign
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple joins China’s national subsidy program · TechNode
Computing
Google Introduces DolphinGemma to Support Dolphin Communication Research
News
Opera spins off MiniPay app to target Africa’s $54bn stablecoin market
Computing
Apple TV+ & Gordon Ramsey cook up ‘Knife Edge: Chasing Michelin Stars’
News

You Might also Like

News

Google Introduces DolphinGemma to Support Dolphin Communication Research

3 Min Read
News

Apple TV+ & Gordon Ramsey cook up ‘Knife Edge: Chasing Michelin Stars’

2 Min Read
News

Apple Expands Accessibility Features Including Live Captions, Magnifier and Sound Recognition

9 Min Read
News

CMA warns of ‘underlying weakness’ at Starling Bank – UKTN

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?