Jan 15, 2026 • Wiz Security Research
CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild
Wiz Research identified a critical supply chain vulnerability termed CodeBreach, targeting AWS infrastructure. The vulnerability exploits a misconfiguration...
Executive Summary
Wiz Research identified a critical supply chain vulnerability termed CodeBreach, targeting AWS infrastructure. The vulnerability exploits a misconfiguration within AWS CodeBuild to hijack key AWS GitHub repositories. Specifically, the compromise affects the JavaScript SDK responsible for powering the AWS Console, representing a significant risk to the AWS supply chain integrity. This incident highlights the severe implications of cloud build environment misconfigurations, allowing attackers to potentially inject malicious code into trusted software artifacts. While no specific threat actor is attributed in this report, the severity is rated critical due to the potential for widespread downstream impact on AWS customers relying on these SDKs. Organizations utilizing AWS CodeBuild should immediately audit their configurations, enforce strict IAM policies, and implement robust supply chain security measures to prevent similar unauthorized repository takeovers and ensure the integrity of their development pipelines against supply chain compromises.
Summary
Wiz Research discovered a critical supply chain vulnerability that abused a CodeBuild misconfiguration to take over key AWS GitHub repositories - including the JavaScript SDK powering the AWS Console.
Published Analysis
Wiz Research identified a critical supply chain vulnerability termed CodeBreach, targeting AWS infrastructure. The vulnerability exploits a misconfiguration within AWS CodeBuild to hijack key AWS GitHub repositories. Specifically, the compromise affects the JavaScript SDK responsible for powering the AWS Console, representing a significant risk to the AWS supply chain integrity. This incident highlights the severe implications of cloud build environment misconfigurations, allowing attackers to potentially inject malicious code into trusted software artifacts. While no specific threat actor is attributed in this report, the severity is rated critical due to the potential for widespread downstream impact on AWS customers relying on these SDKs. Organizations utilizing AWS CodeBuild should immediately audit their configurations, enforce strict IAM policies, and implement robust supply chain security measures to prevent similar unauthorized repository takeovers and ensure the integrity of their development pipelines against supply chain compromises. Wiz Research discovered a critical supply chain vulnerability that abused a CodeBuild misconfiguration to take over key AWS GitHub repositories - including the JavaScript SDK powering the AWS Console. Wiz Research discovered a critical supply chain vulnerability that abused a CodeBuild misconfiguration to take over key AWS GitHub repositories - including the JavaScript SDK powering the AWS Console.