Back

Exploitation of GitHub Actions via pull_request_target Trigger

Severity: High (Score: 67.5)

Sources: Aikido.Dev, github.com, labs.cloudsecurityalliance.org, blog.pypi.org, github.blog

Summary

A targeted campaign exploiting GitHub Actions' pull_request_target trigger was identified, allowing attackers to execute malicious code with elevated privileges. This vulnerability has been documented since 2021 but continues to be misconfigured in many repositories. The hackerbot-claw account scanned public repositories for these misconfigurations, submitting malicious pull requests to high-profile targets, including Microsoft and DataDog projects. Between February 21 and March 2, 2026, this campaign demonstrated the feasibility of such attacks at scale. GitHub has implemented platform-level mitigations, but many users still rely on insecure configurations. The ongoing prt-scan campaign indicates that this attack vector is evolving and may become accessible to a broader range of actors. Security professionals are urged to review their GitHub Actions configurations to mitigate risks. Key Points: • The pull_request_target trigger in GitHub Actions allows elevated access to repository secrets. • A campaign by hackerbot-claw exploited this vulnerability, targeting high-profile repositories. • Despite GitHub's mitigations, misconfigurations remain common, posing ongoing risks.

Key Entities

  • Sql Injection (attack_type)
  • Supply Chain Attack (attack_type)
  • March 2026 Trivy Attack (campaign)
  • Nx/s1ngularity Attack (campaign)
  • Prt-scan (campaign)
  • Tj-actions Compromise (campaign)
  • Ultralytics Attack (campaign)
  • Cloud Native Computing Foundation (company)
  • DataDog (company)
  • Microsoft (company)
  • Azure (company)
  • Cloudflare (company)
  • CWE-78 - OS Command Injection (cwe)
  • Cwe-89 - SQL Injection (cwe)
  • CWE-94 - Code Injection (cwe)
  • T1059.006 - Python (mitre_attack)
  • T1059 - Command and Scripting Interpreter (mitre_attack)
  • T1071 - Application Layer Protocol (mitre_attack)
  • T1567 - Exfiltration Over Web Service (mitre_attack)
  • GitHub (platform)
  • Netlify (platform)
  • PyPI (platform)
  • GitHub Actions (tool)
  • Npm (tool)
  • Trivy (tool)
  • Curl (tool)
  • Gemini CLI (tool)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed