Mar 15, 2025 • Wiz Security Research
GitHub Action tj-actions/changed-files supply chain attack: everything you need to know
A significant supply chain attack targeted the widely used GitHub Action, tj-actions/changed-files, resulting in the compromise of numerous software...
Executive Summary
A significant supply chain attack targeted the widely used GitHub Action, tj-actions/changed-files, resulting in the compromise of numerous software repositories. This incident highlights the critical risks associated with third-party dependencies in CI/CD pipelines. Attackers successfully infiltrated the action, leading to the exfiltration of sensitive secrets and credentials stored within affected repositories. The impact extends beyond immediate data loss, potentially enabling further unauthorized access to connected infrastructure and cloud environments. Organizations utilizing this specific action are urged to immediately audit their workflows for unauthorized changes and rotate all exposed secrets. Mitigation strategies include implementing strict pinning of action versions, enhancing monitoring for anomalous CI/CD behavior, and conducting regular security assessments of third-party integrations. This event underscores the necessity for robust supply chain security practices to prevent similar compromises in the future.
Summary
A supply chain attack on popular GitHub Action tj-actions/changed-files caused many repositories to leak their secrets. Discover how it unfolded and the steps to mitigate the risk.
Published Analysis
A significant supply chain attack targeted the widely used GitHub Action, tj-actions/changed-files, resulting in the compromise of numerous software repositories. This incident highlights the critical risks associated with third-party dependencies in CI/CD pipelines. Attackers successfully infiltrated the action, leading to the exfiltration of sensitive secrets and credentials stored within affected repositories. The impact extends beyond immediate data loss, potentially enabling further unauthorized access to connected infrastructure and cloud environments. Organizations utilizing this specific action are urged to immediately audit their workflows for unauthorized changes and rotate all exposed secrets. Mitigation strategies include implementing strict pinning of action versions, enhancing monitoring for anomalous CI/CD behavior, and conducting regular security assessments of third-party integrations. This event underscores the necessity for robust supply chain security practices to prevent similar compromises in the future. A supply chain attack on popular GitHub Action tj-actions/changed-files caused many repositories to leak their secrets. Discover how it unfolded and the steps to mitigate the risk. A supply chain attack on popular GitHub Action tj-actions/changed-files caused many repositories to leak their secrets. Discover how it unfolded and the steps to mitigate the risk.