Hardening repositories against credential theft
Blog post from GitHub
GitHub Security emphasizes the importance of vigilance against common attack patterns targeting GitHub Actions, particularly those involving compromised personal access tokens (PATs), which can lead to the insertion of malicious workflows or JavaScript files in repositories. These attacks often involve obfuscation techniques, such as using misleading commit usernames, to gain the trust of users. Threats arise not only from stolen tokens but also from compromised accounts or sessions, often due to malware like RedLine Stealer. To mitigate risks, it is advised that repository owners diligently review code changes, especially those involving Actions workflows and JavaScript files, and take preventative measures such as rotating compromised repository secrets, employing security hardening for GitHub Actions, and using environments for deployment. For further protection, users should secure their accounts by reviewing access tokens, changing passwords, resetting two-factor recovery codes, and employing the integrity attribute for JavaScript on websites. GitHub remains committed to disrupting compromised account activities and encourages users to maintain the security of their credentials and remain alert to any suspicious changes in their repositories.