Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Dull but dangerous: A guide to 15 overlooked cybersecurity blind spots

    October 14, 2025

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025

    Is art dead? What Sora 2 means for your rights, creativity, and legal risk

    October 14, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Dull but dangerous: A guide to 15 overlooked cybersecurity blind spots
    • Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
    • Is art dead? What Sora 2 means for your rights, creativity, and legal risk
    • Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
    • AI red flags, ethics boards and the real threat of AGI today
    • I tried smart glasses with xMEMS speakers and active cooling – and they’re full of promise
    • Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
    • Gladinet file sharing zero-day brings patched flaw back from the dead
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Apps»This GitHub trick could let attackers steal secrets from major projects, and no one’s paying attention
    Apps

    This GitHub trick could let attackers steal secrets from major projects, and no one’s paying attention

    TechurzBy TechurzJune 18, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    GitHub Actions found in MITRE, Splunk, and other open source repositories
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Sysdig exposed how a trusted GitHub feature can silently hand control to attackers
    • pull_request_target isn’t just risky, it’s a loaded weapon in the wrong hands
    • Even top-tier security projects like MITRE’s can fall to simple GitHub workflow misconfigurations

    Experts have revealed several critical vulnerabilities in GitHub Actions workflows which could pose serious risks to some major open source projects.

    A recent investigation by Sysdig’s Threat Research Team (TRT) has exposed how misconfigurations, particularly involving the pull_request_target trigger, could let attackers seize control over active repositories or extract sensitive credentials.

    The team demonstrated this by compromising projects from well-known organizations such as MITRE and Splunk.


    You may like

    GitHub Actions is widely adopted in modern software development for its automation capabilities, but this convenience often hides security risks.

    “Modern supply chain attacks frequently begin by abusing insecure workflows,” the report states, noting how secrets like tokens or passwords embedded in workflows can be exploited if improperly secured.

    Despite available best practices and documentation, many repositories continue to use high-risk configurations, either from oversight or a lack of awareness.

    At the core of the problem is the pull_request_target trigger, which runs workflows in the context of the main branch.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    This setup grants elevated privileges, including access to GITHUB_TOKEN and repository secrets, to code submitted from forks.

    While intended to facilitate pre-merge testing, this mechanism also allows execution of untrusted code, creating an attack surface that is easily overlooked.

    The risks are not hypothetical, they are real.

    In the Spotipy repository, which integrates with Spotify’s Web API, Sysdig discovered a setup where a crafted setup.py could execute code and harvest secrets.

    In MITRE’s Cybersecurity Analytics Repository (CAR), attackers were able to execute arbitrary code by modifying dependencies.

    Sysdig confirmed it was possible to take over the GitHub account associated with the project.

    Even Splunk’s security_content repository had secrets like APPINSPECTUSERNAME and APPINSPECTPASSWORD exposed, despite the limited scope of the GITHUB_TOKEN.

    Developers should reassess the use of pull_request_target, considering safer alternatives – Sysdig recommends separating workflows, using unprivileged checks first, and only allowing sensitive tasks after validation.

    Limiting the capabilities of tokens and adopting real-time monitoring with tools like Falco Actions can also provide vital protection.

    You might also like

    attackers attention GitHub major Paying projects Secrets steal Trick
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAI Culture Readiness Demands New Mindsets
    Next Article Here’s What to Know if a TikTok Sale Never Goes Through
    Techurz
    • Website

    Related Posts

    Security

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025
    Security

    Aisuru’s 30 Tbps botnet traffic crashes through major US ISPs

    October 13, 2025
    Security

    Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

    October 13, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    Dull but dangerous: A guide to 15 overlooked cybersecurity blind spots

    October 14, 2025

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    October 14, 2025

    Is art dead? What Sora 2 means for your rights, creativity, and legal risk

    October 14, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.