March 19, 2025

New GitHub Actions Supply Chain Attack Highlights Ongoing Risks in CI/CD Pipelines

New GitHub Actions Supply Chain Attack Highlights Ongoing Risks in CI/CD Pipelines

New GitHub Actions Supply Chain Attack Highlights Ongoing Risks in CI/CD Pipelines

Introduction

A recently discovered supply chain attack has once again exposed vulnerabilities in GitHub Actions, a widely used CI/CD automation tool. The attack, which targeted the reviewdog/actions-setup@v1 tool, has raised concerns about the security of open-source software dependencies and the potential risks they pose to developers and organizations. This incident follows a previous attack on tj-actions/changed-files, suggesting a deliberate effort to compromise repositories and extract sensitive information such as API keys and credentials.

Details of the Attack

Security researchers have found that attackers inserted malicious code into the reviewdog/actions-setup@v1 GitHub Action, a tool commonly used to automate code review processes. This injection allowed the attacker to execute unauthorized commands and potentially exfiltrate secrets stored within repositories utilizing the action.

This attack shares similarities with an earlier compromise of tj-actions/changed-files, which affected over 23,000 repositories by altering its codebase to steal environment variables containing sensitive credentials. The two incidents indicate a pattern of attackers targeting popular GitHub Actions with the goal of infiltrating the software supply chain.

Implications for the Developer Community

The security breach highlights the growing risks associated with third-party GitHub Actions. Many development teams rely on open-source CI/CD tools to automate deployments, build pipelines, and enforce security checks. However, these tools can become entry points for attackers if not properly secured.

Organizations using GitHub Actions must be aware of the risks associated with external dependencies. Threat actors exploiting vulnerabilities in automation workflows can gain access to sensitive infrastructure components, leading to potential data leaks, unauthorized access, or even supply chain compromises across multiple projects.

Best Practices to Prevent Similar Attacks

To mitigate the risk of supply chain attacks in GitHub Actions, developers and security teams should implement the following security measures:

  1. Pin Dependencies to Specific Versions
    • Instead of using floating versions (e.g., @v1 or @latest), always pin GitHub Actions to a specific commit SHA.
    • Example:uses: actions/checkout@d3f5a2b7e0f4c5e9f5c7a6e9f5b7c3d5a2b6e7c9
  2. Restrict Permissions of GitHub Tokens
    • Apply the principle of least privilege by limiting repository permissions in workflows.
    • Example:permissions:
       contents: read
  3. Monitor and Audit GitHub Actions Logs
    • Regularly review workflow execution logs for any unexpected behavior or unauthorized modifications.
  4. Use Self-Hosted Runners with Strict Network Controls
    • If feasible, self-hosted runners should be placed behind firewalls and have limited outbound access to prevent unauthorized data exfiltration.
  5. Restrict Workflow Execution
    • Configure branch protection rules to ensure that workflows only run on trusted branches.
    • Example:on:
       push:
         branches:
           - main
           - stable
  6. Verify External Actions Before Use
    • Prefer official GitHub-maintained actions or well-audited dependencies over community-contributed ones.
  7. Rotate and Secure Secrets
    • Use GitHub’s encrypted secrets functionality and regularly rotate access tokens and API keys.
  8. Enable GitHub Advanced Security Features
    • Leverage tools like Dependabot and secret scanning to detect vulnerabilities and misconfigurations in workflows.
  9. Adopt OpenID Connect (OIDC) Authentication
    • Use OIDC instead of storing long-lived credentials in repositories to enhance security.
    • Example:permissions:
       id-token: write

Conclusion

The recent GitHub Actions supply chain attack serves as a critical reminder of the vulnerabilities that exist within modern software development pipelines. Organizations must take proactive steps to secure their CI/CD workflows by implementing best practices, restricting permissions, and continuously monitoring for threats. As attackers refine their techniques, the security community must remain vigilant to safeguard the integrity of software supply chains. By staying ahead of emerging threats and adopting secure development practices, developers can minimize the risks associated with GitHub Actions and other CI/CD automation tools.