GitHub Action Alert: How a Rogue Bot Exposed 23K Repos & What You Can Do
GitHub security alert: Malicious code discovered in “tj-actions/changed-files,” impacting over 23,000 repositories. The vulnerability could expose sensitive data in CI/CD pipelines. Learn how to check, remove, and protect your projects from this sneaky digital hitchhiker.

Hot Take:
In a plot twist worthy of a cyber-thriller, GitHub Actions were caught red-handed, or should we say “red-coded,” in a scandal affecting over 23,000 repositories! Who knew that “tj-actions/changed-files” would change the action from coding to chaos? Time to batten down the hatches, folks, and guard your secrets like they’re the last slice of pizza at a tech conference!
Key Points:
- Malicious code was found in the “tj-actions/changed-files” GitHub Action, impacting 23,000+ repositories.
- The vulnerability, CVE-2025-30066, allowed attackers to access secrets and authentication tokens.
- The compromise began with a malicious commit on March 14th, disguised as a Dependabot update.
- GitHub removed the compromised Action, causing potential disruptions in CI pipelines.
- Endor Labs and other organizations provided guidance to mitigate and secure affected systems.
GitHub Gaffe: The Vulnerability Unveiled
Hold onto your keyboards, folks, because the cybersecurity world just got spicier with a newly discovered vulnerability in the “tj-actions/changed-files” GitHub Action. This isn’t just any vulnerability—it’s CVE-2025-30066, a digital gremlin allowing cyber-baddies to snoop around action logs and unearth secrets, passwords, and tokens. If your CI/CD pipelines felt like a walk in the park before, they’re now more like walking a tightrope over a pit of hungry hackers.
March Madness: A Malicious Commit
March 14th, normally just another day for techies, turned into a cyber soap opera with the introduction of a malicious commit. Masquerading as a routine Dependabot update, this sneaky code led to action tags being redirected to the compromised commit. Before you could say “pull request,” repositories were at risk, with secrets playing hide and seek in the logs. The cybersecurity community wasn’t having it, and soon the alarm bells were ringing louder than a fire drill at a coding bootcamp.
Repo Rewind: The Cleanup Operation
Like a plot twist in a thriller movie, the compromised repository was taken offline faster than you can say “cybersecurity breach,” preventing further downloads of the infected version. But the damage was done, as 23,000 repositories had already had a taste of the chaos. The repository was eventually reactivated on March 16th, minus the malicious bit, but it was like putting the toothpaste back in the tube—tricky and a tad messy.
GitHub’s Cleanup: Removing the Rotten Action
In an act of digital spring cleaning, GitHub booted the compromised Action out of their ecosystem, leaving developers scrambling for alternatives like tech-savvy squirrels looking for nuts in winter. This sudden removal threw a wrench into CI pipelines, especially for those who lived life on the edge with non-cached versions. It was time for some serious pipeline patchwork.
Endor Labs to the Rescue: Guidance for the Troubled
Enter Endor Labs, the digital equivalent of the Ghostbusters for this haunting issue. They published a blog post offering a step-by-step guide to exorcising this vulnerability from systems. From searching dependencies to auditing GitHub logs for shady IP addresses, it was a cybersecurity masterclass. For those who didn’t get the Endor memo, it was a crash course in “How Not to Get Hacked 101.”
Supply Chain Shenanigans: The Bigger Picture
But wait, there’s more! The real goal of these cyber rascals wasn’t just to steal secrets—those were the appetizers. The main course was the software supply chain, with open-source libraries, binaries, and artifacts in their crosshairs. It was a digital buffet, and they were ready to fill their plates. Thousands of open-source packages might have been compromised, turning this into an epic saga of cyber mischief.
Lessons Learned: Protecting Your Digital Fort
So, what’s the moral of this story? Well, it’s time to don your cybersecurity cape and swing into action. Whether you’re part of the Endor Labs club or not, inspecting workflows, removing compromised actions, and rotating secrets are your new best friends. And remember, in the world of cybersecurity, it’s better to be the hero in your own story than the victim in someone else’s.