GitHub Supply Chain Chaos: Reviewdog Breach Spills CI/CD Secrets Everywhere!
A malicious supply chain attack on the tj-actions/changed-files GitHub Action exposed CI/CD secrets, thanks to the compromised reviewdog/action-setup. With 23,000 repositories at risk, developers are advised to rotate secrets faster than a DJ spins records, and pin actions to specific commit hashes to prevent future breaches.

Hot Take:
Who knew that a simple GitHub action could cause a domino effect worthy of a soap opera? It seems like “reviewdog/action-setup@v1” wasn’t just setting up actions, but also setting up a cascade of chaos and leaked secrets. If this were a movie, it would definitely be called “The GitHub Heist: A Tale of Secrets and Supply Chains.”
Key Points:
- A cascading supply chain attack began with the compromise of the “reviewdog/action-setup@v1” GitHub Action.
- The breach affected “tj-actions/changed-files,” leading to the leak of CI/CD secrets.
- Attackers inserted code to dump secrets to logs, affecting 23,000 repositories.
- Wiz researchers linked the attack to a compromised GitHub personal access token (PAT).
- Developers are advised to remove references to affected actions and rotate exposed secrets.
Already a member? Log in here