Skip to content

Latest commit

 

History

History
10 lines (7 loc) · 1.44 KB

overview.md

File metadata and controls

10 lines (7 loc) · 1.44 KB

Before diving into details, let's overview the landscape of GitHub Actions workflow vulnerabilies.

Why would the attacker hack workflows? There are at least two goals: (1) steal secrets and (2) modify the base repository in order to compromise the supply chain or users of the repository (e.g. place a backdoor or other malware). Technically, modifying the base repository is a special case of stealing secrets because the repository is usually modified with the GITHUB_TOKEN. Many workflows hold powerful secrets such as registry keys (npm, PyPI, DockerHub, ...), cloud credentials (AWS, Google Cloud, ...), and others. Thus workflows are critical-impact targets.

If you're new to workflow vulnerabilities, good starting point would be the "Keeping your GitHub Actions and workflows secure" series by Jaroslav Lobačevski: