gha-security-review
Audited by Socket on Mar 20, 2026
2 alerts found:
AnomalySecurityThis file is a descriptive incident/reference report — not malicious software — that documents real GitHub Actions exploitation techniques and provides explicit examples of malicious payloads and attacker infrastructure. It contains concrete, actionable attack patterns (curl|bash, branch/filename injection, forked action modification, Go init() misuse, comment-trigger abuse) and references to a repeated attacker domain. The document itself poses no direct code-execution risk, but because it contains working payload patterns and domains, it is sensitive: copying these patterns into live workflows without mitigation would enable compromise. Reviewers should treat the described patterns as high-risk and harden workflows accordingly.
SUSPICIOUS: The skill’s stated purpose matches its capabilities, and there is no installer, credential, or exfiltration abuse. However, it is a high-risk offensive security skill: it directs the agent to analyze untrusted repository content, including prompt/config files, while having Bash/Task execution rights and producing exploit-focused PoCs. Main concern is exploit enablement and indirect prompt-injection exposure, not malware or supply-chain deception.