The letter S in a light blue, stylized speech bubble followed by SpeakBits
SpeakBitsThe letter S in a light blue, stylized speech bubble followed by SpeakBits
Trending
Top
New
Controversial
Search
Groups

Enjoying SpeakBits?

Support the development of it by donating to Patreon or Ko-Fi.
About
Rules
Terms
Privacy
EULA
Cookies
Blog
Have feedback? We'd love to hear it!

ArtiPACKED: Hacking Giants Through a Race Condition in GitHub Actions Artifacts

paloaltonetworks.com
submitted
9 mos ago
byjustadevtoprogramming

Summary

A combination of misconfigurations and security flaws can make artifacts leak tokens, both of third party cloud services and GitHub tokens. This allows malicious actors with access to these artifacts the potential of compromising the services to which these secrets grant access.

CI/CD pipelines use highly sensitive credentials to authenticate against various types of services. This article covers the potential impact of insecure usage of GitHub Actions artifacts. It also explains the methods and tools to protect against this threat.

GitHub tokens are created when a workflow runs, and once created, they’re stored for up to 90 days. These artifacts are publicly available for anyone to consume. So why not scan these artifacts for secrets?

In this week's Daily Discussion, we look at the role of technology in the world of business. This week's topic is the role played by technology in society.

The GITHUB_TOKEN is an ephemeral token created in any workflow job run. It's designed to allow workflows to interact with GitHub resources, like the repository. The token can be set with limited scope and to expire on job completion.

The GITHUB_TOKEN can be used to replace an existing piece of code. It can also be used as a way to force a change in the source code.

GitHub announced deprecation of v3, effective November 2024. Software dependencies bots automatically create pull requests updating to v4. I scanned the artifacts of each of these projects for secrets and was interested in the ones exposing their GITHUB_TOKEN.

Let’s face it, we’re all in this together. We’ve all been there. Let’S face it. Let's face it: We�’ll all be there together.

The problem is that the system is not set up to deal with such a large number of artifacts. The problem is with the way the system works.

Security defenders must adopt a holistic approach, scrutinizing every stage for potential vulnerabilities. GitHub's deprecation of Artifacts V3 should prompt organizations to reevaluate the way they use it.

 web site website internet site site cellular telephone cellular phone cellphone cell mobile phone television television system digital clock-0
10

4 Comments

3
throwschen
9 mos ago
This is the biggest reason anything that has knowledge of or touches sensitive systems should be private and not publicly available
2
justadevOP
9 mos ago
That costs money and will be fought against tooth and nail
2
throwschen
9 mos ago
Data breaches cost more but I hear ya, corporations will cheap out everywhere they can!
2
iareunique
9 mos ago
I have a feeling we're going to go back to closed systems because of all this