Whose Code Am I Running in GitHub Actions?

Malicious code was added to the tj-actions/changed-files GitHub Action, leaking secrets in public repositories. Using mutable Git tags can lead to unexpected code execution; using commit IDs ensures immutability. The author ran a shell script to check their GitHub Actions for such vulnerabilities and reviewed the trustworthiness of the actions based on their sources. The process involved using Unix text processing tools to extract and tally actions from workflow files, emphasizing security practices in leveraging third-party actions.

https://alexwlchan.net/2025/github-actions-audit/

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top