GitHub Gaffe: Over 23,000 Organizations Exposed by Malicious Action Mishap!

Over 23,000 organizations learned the hard way that their GitHub Actions were a little too public. A compromised GitHub Action leaked secrets like a sieve, exposing CI/CD secrets to anyone with a Wi-Fi connection. The attack, which targeted the tj-actions/changed-files, has been tagged with CVE-2025-30066. GitHub has since removed the compromised code.

Pro Dashboard

Hot Take:

Who knew that secrets could be so easy to spill? In the latest installment of “Oops, I Did It Again,” over 23,000 organizations learned the hard way that their confidential data was just a GitHub Action away from being exposed. Let’s just hope this was a dress rehearsal and not the main event in the cybersecurity theater!

Key Points:

  • Over 23,000 organizations unknowingly exposed secrets due to a compromised GitHub Action.
  • GitHub Actions is a platform for CI/CD, which helps streamline code processes.
  • Attackers tampered with the tj-actions/changed-files GitHub Action.
  • The malicious commit allowed CI/CD secrets to be printed in public logs.
  • No evidence that leaked secrets were exfiltrated, but concerns remain about potential software supply chain compromise.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?