What Happened to GitHub Actions Token Disclosure Incidents?
GitHub Actions has been a recurring target for token disclosure incidents, where sensitive access tokens are inadvertently exposed through misconfigurations, vulnerabilities in third-party actions, or insecure coding practices. These disclosures have led to significant supply chain attacks, data exfiltration, and unauthorized access to repositories and integrated systems. GitHub continues to release security enhancements and a 2026 roadmap to address these persistent threats.
Quick Answer
GitHub Actions has experienced multiple incidents of token disclosure, where `GITHUB_TOKEN`s and other secrets are leaked, often due to vulnerabilities in workflows, third-party actions, or human error. These leaks enable attackers to gain unauthorized access, exfiltrate data, and launch supply chain attacks. In response, GitHub has implemented stricter default permissions, introduced features like SHA pinning enforcement and immutable releases, and outlined a comprehensive 2026 security roadmap focusing on deterministic dependencies, scoped secrets, and native egress firewalls. Most recently, on May 13, 2026, a critical vulnerability in Composer was patched that could lead to `GITHUB_TOKEN` disclosure in logs due to a new token format, prompting GitHub to temporarily roll back the new format.
📊Key Facts
📅Complete Timeline14 events
Tinder Security Labs Identifies RCE Vulnerabilities
Tinder Security Labs open-sources a tool to detect Remote Code Execution (RCE) vulnerabilities in GitHub Actions, highlighting risks like exfiltrating custom and built-in secrets, including `GitHubToken`s.
GitHub Changes Default GITHUB_TOKEN Permissions
GitHub updates its default workflow token permissions for new repositories from read-write to read-only, enforcing a least-privilege security model.
github-slug-action Vulnerability Disclosed (CVE-2023-27581)
A vulnerability in `rlespinasse/github-slug-action` is disclosed, allowing arbitrary code execution and potential exfiltration of secrets due to insecure use of `github.head_ref` in pull requests.
New York Times Breach Linked to Exposed GitHub Token
The New York Times experiences a significant security breach, resulting in the theft and leak of 270GB of internal data, which is later confirmed to have originated from an exposed GitHub token.
Critical Flaw in tj-actions/changed-files Revealed (CVE-2023-49291)
Security researcher Adnan Khan reveals details of a critical flaw (CVSS score: 9.8) affecting `tj-actions/changed-files` and `tj-actions/branch-names`, enabling arbitrary code execution.
ArtiPACKED Research Highlights Artifact Token Leaks
Palo Alto Networks discloses 'ArtiPACKED' research, revealing a new attack vector where GitHub Actions workflow artifacts on public repositories accidentally leak `GITHUB_TOKEN`s and other secrets.
SpotBugs Token Compromised via pull_request_target
A Personal Access Token (PAT) belonging to a SpotBugs maintainer is compromised through a malicious pull request exploiting a `pull_request_target` trigger, leading to further attacks.
tj-actions/changed-files Compromised (CVE-2025-30066)
The popular GitHub Action `tj-actions/changed-files` is compromised, leading to the leakage of CI/CD secrets from over 23,000 repositories. The attack involved modifying the action's code and retroactively updating version tags.
reviewdog/action-setup/v1 Compromised (CVE-2025-30154)
Around the same time as the `tj-actions` incident, `reviewdog/action-setup/v1` is also compromised, though on a smaller scale, affecting approximately 1,500 repositories.
GitHub Reports 39 Million Secret Leaks in 2024
GitHub announces that it detected 39 million secret leaks across its platform in 2024, emphasizing the ongoing challenge of preventing accidental token exposure.
GitGuardian Discovers GhostAction Supply Chain Attack
GitGuardian identifies 'GhostAction,' a large-scale supply chain attack affecting 327 GitHub users and 817 repositories, which exfiltrated 3,325 secrets including PyPI, npm, and DockerHub tokens.
New Wave of Supply Chain Attacks (Trivy-action, Axios)
A fresh wave of supply chain attacks targets projects like `TeamPCP / Trivy-action` and `Axios`, exploiting mutable action references and leading to credential theft and lateral movement.
GitHub Publishes 2026 Actions Security Roadmap
GitHub announces its 2026 Actions Security Roadmap, detailing upcoming features like Deterministic Dependency Locking, Scoped Secrets, Native Egress Firewall, and Policy-Driven Execution Controls to enhance CI/CD security.
Composer Patch for GITHUB_TOKEN Disclosure (GHSA-f9f8-rm49-7jv2)
Composer releases urgent updates (2.9.8 and 2.2.28) to fix a vulnerability where new GitHub Actions `GITHUB_TOKEN`s, containing hyphens, are disclosed in workflow logs due to Composer's validation failure. GitHub temporarily rolls back the new token format.
🔍Deep Dive Analysis
The 'GitHub Actions Token Disclosure Incident' refers not to a single event, but a series of vulnerabilities and attacks that have exposed sensitive access tokens within GitHub's automation platform. These incidents highlight the inherent risks in CI/CD pipelines, where misconfigurations or compromised components can lead to widespread security breaches. The `GITHUB_TOKEN`, automatically generated for each workflow run, and other secrets (like Personal Access Tokens or cloud credentials) are prime targets for attackers.
One of the primary reasons for these disclosures is often insecure workflow configurations. Developers might inadvertently log tokens, store them in plaintext, or use them in contexts where they can be exfiltrated. For instance, public workflow logs or artifacts have been identified as vectors for token leakage. Another significant factor is the reliance on third-party GitHub Actions. If a third-party action contains a vulnerability or is compromised, it can gain access to all secrets configured for the workflow, leading to widespread data exfiltration. The mutable nature of action references (e.g., using `@v4` instead of a specific commit SHA) allows attackers to silently replace legitimate code with malicious versions.
Key turning points include the recognition of `pull_request_target` vulnerabilities, which allow workflows triggered by forks to access secrets, and the increasing sophistication of supply chain attacks. In February 2023, GitHub proactively changed the default `GITHUB_TOKEN` permissions for new repositories to read-only, a crucial step towards least privilege. However, incidents continued, such as the January 2024 New York Times breach attributed to an exposed GitHub token, resulting in the theft of 270GB of internal data. The March 2025 compromise of `tj-actions/changed-files`, affecting over 23,000 repositories, demonstrated the cascading impact of a single compromised action. This incident was traced to a compromised Personal Access Token (PAT) used by a bot account.
The consequences of these disclosures are severe, ranging from intellectual property theft and unauthorized code modification to lateral movement into cloud environments and other internal systems. GitHub reported finding 39 million secret leaks in 2024, underscoring the scale of the problem. As of May 2026, the threat landscape remains active, with new supply chain attacks like the `Trivy-action` and `Axios` compromises occurring in March 2026, exploiting mutable action references.
CURRENT STATUS as of 2026-05-13: GitHub is actively addressing these challenges. On March 26, 2026, GitHub published its 2026 Actions Security Roadmap, outlining significant enhancements. These include: Deterministic Dependency Locking (to prevent mutable action reference attacks), Scoped Secrets (for more granular control over credential access), Native Egress Firewall (to limit outbound network connections from runners), Policy-Driven Execution Controls, and an Actions Data Stream for better observability. Organizations are strongly advised to adopt best practices such as pinning all actions to full commit SHAs, setting `GITHUB_TOKEN` permissions to read-only by default, and using OpenID Connect (OIDC) for cloud credentials. Most recently, on May 13, 2026, a critical vulnerability (GHSA-f9f8-rm49-7jv2) was disclosed and patched in Composer (versions 2.9.8 and 2.2.28) that could lead to the disclosure of `GITHUB_TOKEN`s in GitHub Actions logs. This was due to a new GitHub token format containing hyphens, which Composer's validation regex failed to recognize, causing the full token to be printed in error messages. GitHub temporarily rolled back the new token format to allow the PHP ecosystem time to update Composer.
What If...?
Explore alternate histories. What if GitHub Actions Token Disclosure Incidents made different choices?