Exploitation of GitHub Actions via pull_request_target Trigger
Severity: High (Score: 67.5)
Sources: Aikido.Dev, github.com, labs.cloudsecurityalliance.org, blog.pypi.org, github.blog
Summary
A targeted campaign exploiting GitHub Actions' pull_request_target trigger was identified, allowing attackers to execute malicious code with elevated privileges. This vulnerability has been documented since 2021 but continues to be misconfigured in many repositories. The hackerbot-claw account scanned public repositories for these misconfigurations, submitting malicious pull requests to high-profile targets, including Microsoft and DataDog projects. Between February 21 and March 2, 2026, this campaign demonstrated the feasibility of such attacks at scale. GitHub has implemented platform-level mitigations, but many users still rely on insecure configurations. The ongoing prt-scan campaign indicates that this attack vector is evolving and may become accessible to a broader range of actors. Security professionals are urged to review their GitHub Actions configurations to mitigate risks. Key Points: • The pull_request_target trigger in GitHub Actions allows elevated access to repository secrets. • A campaign by hackerbot-claw exploited this vulnerability, targeting high-profile repositories. • Despite GitHub's mitigations, misconfigurations remain common, posing ongoing risks.
Key Entities
- Sql Injection (attack_type)
- Supply Chain Attack (attack_type)
- March 2026 Trivy Attack (campaign)
- Nx/s1ngularity Attack (campaign)
- Prt-scan (campaign)
- Tj-actions Compromise (campaign)
- Ultralytics Attack (campaign)
- Cloud Native Computing Foundation (company)
- DataDog (company)
- Microsoft (company)
- Azure (company)
- Cloudflare (company)
- CWE-78 - OS Command Injection (cwe)
- Cwe-89 - SQL Injection (cwe)
- CWE-94 - Code Injection (cwe)
- T1059.006 - Python (mitre_attack)
- T1059 - Command and Scripting Interpreter (mitre_attack)
- T1071 - Application Layer Protocol (mitre_attack)
- T1567 - Exfiltration Over Web Service (mitre_attack)
- GitHub (platform)
- Netlify (platform)
- PyPI (platform)
- GitHub Actions (tool)
- Npm (tool)
- Trivy (tool)
- Curl (tool)
- Gemini CLI (tool)