← Back to BrewedIntel
vulnerabilityhighCloud CompromiseCredential Theft

Dec 09, 2025 • Wiz Security Research

Code to Cloud Attacks: From Github PAT to Cloud Control Plane

This advisory highlights a critical attack vector where adversaries exploit compromised GitHub Personal Access Tokens (PATs) to gain unauthorized access to...

Source
Wiz Security Research
Category
vulnerability
Severity
high

Executive Summary

This advisory highlights a critical attack vector where adversaries exploit compromised GitHub Personal Access Tokens (PATs) to gain unauthorized access to cloud control planes. By leveraging valid credentials obtained from code repositories, attackers bypass traditional perimeter defenses and establish persistent access within cloud environments. The severity is high due to the potential for full cloud infrastructure compromise, data exfiltration, and resource manipulation. Organizations must prioritize secret management practices, including regular rotation of PATs, implementation of least privilege access controls, and automated scanning for leaked credentials in public repositories. Enhanced monitoring of cloud audit logs for anomalous token usage is essential for early detection. This technique underscores the risk of supply chain and developer workflow vulnerabilities, necessitating a shift towards zero-trust architectures within CI/CD pipelines to mitigate credential theft leading to widespread cloud compromise.

Summary

How attackers are leveraging compromised employee GitHub Personal Access Tokens to compromise cloud environments.

Published Analysis

This advisory highlights a critical attack vector where adversaries exploit compromised GitHub Personal Access Tokens (PATs) to gain unauthorized access to cloud control planes. By leveraging valid credentials obtained from code repositories, attackers bypass traditional perimeter defenses and establish persistent access within cloud environments. The severity is high due to the potential for full cloud infrastructure compromise, data exfiltration, and resource manipulation. Organizations must prioritize secret management practices, including regular rotation of PATs, implementation of least privilege access controls, and automated scanning for leaked credentials in public repositories. Enhanced monitoring of cloud audit logs for anomalous token usage is essential for early detection. This technique underscores the risk of supply chain and developer workflow vulnerabilities, necessitating a shift towards zero-trust architectures within CI/CD pipelines to mitigate credential theft leading to widespread cloud compromise. How attackers are leveraging compromised employee GitHub Personal Access Tokens to compromise cloud environments. How attackers are leveraging compromised employee GitHub Personal Access Tokens to compromise cloud environments.