💻 techEvent0 views4 min read

What Happened to GitHub Actions Token Disclosure Incidents?

GitHub Actions has been a recurring target for token disclosure incidents, where sensitive access tokens are inadvertently exposed through misconfigurations, vulnerabilities in third-party actions, or insecure coding practices. These disclosures have led to significant supply chain attacks, data exfiltration, and unauthorized access to repositories and integrated systems. GitHub continues to release security enhancements and a 2026 roadmap to address these persistent threats.

Share:

Quick Answer

GitHub Actions has experienced multiple incidents of token disclosure, where `GITHUB_TOKEN`s and other secrets are leaked, often due to vulnerabilities in workflows, third-party actions, or human error. These leaks enable attackers to gain unauthorized access, exfiltrate data, and launch supply chain attacks. In response, GitHub has implemented stricter default permissions, introduced features like SHA pinning enforcement and immutable releases, and outlined a comprehensive 2026 security roadmap focusing on deterministic dependencies, scoped secrets, and native egress firewalls. Most recently, on May 13, 2026, a critical vulnerability in Composer was patched that could lead to `GITHUB_TOKEN` disclosure in logs due to a new token format, prompting GitHub to temporarily roll back the new format.

📊Key Facts

Secret leaks found by GitHub in 2024
39 million
GitHub
Repositories affected by tj-actions/changed-files compromise (March 2025)
Over 23,000
Sysdig, StepSecurity
Data leaked in New York Times breach (January 2024)
270GB
Clutch Security

📅Complete Timeline14 events

1
July 26, 2022Notable

Tinder Security Labs Identifies RCE Vulnerabilities

Tinder Security Labs open-sources a tool to detect Remote Code Execution (RCE) vulnerabilities in GitHub Actions, highlighting risks like exfiltrating custom and built-in secrets, including `GitHubToken`s.

2
February 2023Major

GitHub Changes Default GITHUB_TOKEN Permissions

GitHub updates its default workflow token permissions for new repositories from read-write to read-only, enforcing a least-privilege security model.

3
March 13, 2023Major

github-slug-action Vulnerability Disclosed (CVE-2023-27581)

A vulnerability in `rlespinasse/github-slug-action` is disclosed, allowing arbitrary code execution and potential exfiltration of secrets due to insecure use of `github.head_ref` in pull requests.

4
January 2024Critical

New York Times Breach Linked to Exposed GitHub Token

The New York Times experiences a significant security breach, resulting in the theft and leak of 270GB of internal data, which is later confirmed to have originated from an exposed GitHub token.

5
January 2024Major

Critical Flaw in tj-actions/changed-files Revealed (CVE-2023-49291)

Security researcher Adnan Khan reveals details of a critical flaw (CVSS score: 9.8) affecting `tj-actions/changed-files` and `tj-actions/branch-names`, enabling arbitrary code execution.

6
August 19, 2024Major

ArtiPACKED Research Highlights Artifact Token Leaks

Palo Alto Networks discloses 'ArtiPACKED' research, revealing a new attack vector where GitHub Actions workflow artifacts on public repositories accidentally leak `GITHUB_TOKEN`s and other secrets.

7
December 2024Major

SpotBugs Token Compromised via pull_request_target

A Personal Access Token (PAT) belonging to a SpotBugs maintainer is compromised through a malicious pull request exploiting a `pull_request_target` trigger, leading to further attacks.

8
March 14, 2025Critical

tj-actions/changed-files Compromised (CVE-2025-30066)

The popular GitHub Action `tj-actions/changed-files` is compromised, leading to the leakage of CI/CD secrets from over 23,000 repositories. The attack involved modifying the action's code and retroactively updating version tags.

9
March 11, 2025Notable

reviewdog/action-setup/v1 Compromised (CVE-2025-30154)

Around the same time as the `tj-actions` incident, `reviewdog/action-setup/v1` is also compromised, though on a smaller scale, affecting approximately 1,500 repositories.

10
April 4, 2025Major

GitHub Reports 39 Million Secret Leaks in 2024

GitHub announces that it detected 39 million secret leaks across its platform in 2024, emphasizing the ongoing challenge of preventing accidental token exposure.

11
September 5, 2025Major

GitGuardian Discovers GhostAction Supply Chain Attack

GitGuardian identifies 'GhostAction,' a large-scale supply chain attack affecting 327 GitHub users and 817 repositories, which exfiltrated 3,325 secrets including PyPI, npm, and DockerHub tokens.

12
March 2026Critical

New Wave of Supply Chain Attacks (Trivy-action, Axios)

A fresh wave of supply chain attacks targets projects like `TeamPCP / Trivy-action` and `Axios`, exploiting mutable action references and leading to credential theft and lateral movement.

13
March 26, 2026Critical

GitHub Publishes 2026 Actions Security Roadmap

GitHub announces its 2026 Actions Security Roadmap, detailing upcoming features like Deterministic Dependency Locking, Scoped Secrets, Native Egress Firewall, and Policy-Driven Execution Controls to enhance CI/CD security.

14
May 13, 2026Critical

Composer Patch for GITHUB_TOKEN Disclosure (GHSA-f9f8-rm49-7jv2)

Composer releases urgent updates (2.9.8 and 2.2.28) to fix a vulnerability where new GitHub Actions `GITHUB_TOKEN`s, containing hyphens, are disclosed in workflow logs due to Composer's validation failure. GitHub temporarily rolls back the new token format.

🔍Deep Dive Analysis

The 'GitHub Actions Token Disclosure Incident' refers not to a single event, but a series of vulnerabilities and attacks that have exposed sensitive access tokens within GitHub's automation platform. These incidents highlight the inherent risks in CI/CD pipelines, where misconfigurations or compromised components can lead to widespread security breaches. The `GITHUB_TOKEN`, automatically generated for each workflow run, and other secrets (like Personal Access Tokens or cloud credentials) are prime targets for attackers.

One of the primary reasons for these disclosures is often insecure workflow configurations. Developers might inadvertently log tokens, store them in plaintext, or use them in contexts where they can be exfiltrated. For instance, public workflow logs or artifacts have been identified as vectors for token leakage. Another significant factor is the reliance on third-party GitHub Actions. If a third-party action contains a vulnerability or is compromised, it can gain access to all secrets configured for the workflow, leading to widespread data exfiltration. The mutable nature of action references (e.g., using `@v4` instead of a specific commit SHA) allows attackers to silently replace legitimate code with malicious versions.

Key turning points include the recognition of `pull_request_target` vulnerabilities, which allow workflows triggered by forks to access secrets, and the increasing sophistication of supply chain attacks. In February 2023, GitHub proactively changed the default `GITHUB_TOKEN` permissions for new repositories to read-only, a crucial step towards least privilege. However, incidents continued, such as the January 2024 New York Times breach attributed to an exposed GitHub token, resulting in the theft of 270GB of internal data. The March 2025 compromise of `tj-actions/changed-files`, affecting over 23,000 repositories, demonstrated the cascading impact of a single compromised action. This incident was traced to a compromised Personal Access Token (PAT) used by a bot account.

The consequences of these disclosures are severe, ranging from intellectual property theft and unauthorized code modification to lateral movement into cloud environments and other internal systems. GitHub reported finding 39 million secret leaks in 2024, underscoring the scale of the problem. As of May 2026, the threat landscape remains active, with new supply chain attacks like the `Trivy-action` and `Axios` compromises occurring in March 2026, exploiting mutable action references.

CURRENT STATUS as of 2026-05-13: GitHub is actively addressing these challenges. On March 26, 2026, GitHub published its 2026 Actions Security Roadmap, outlining significant enhancements. These include: Deterministic Dependency Locking (to prevent mutable action reference attacks), Scoped Secrets (for more granular control over credential access), Native Egress Firewall (to limit outbound network connections from runners), Policy-Driven Execution Controls, and an Actions Data Stream for better observability. Organizations are strongly advised to adopt best practices such as pinning all actions to full commit SHAs, setting `GITHUB_TOKEN` permissions to read-only by default, and using OpenID Connect (OIDC) for cloud credentials. Most recently, on May 13, 2026, a critical vulnerability (GHSA-f9f8-rm49-7jv2) was disclosed and patched in Composer (versions 2.9.8 and 2.2.28) that could lead to the disclosure of `GITHUB_TOKEN`s in GitHub Actions logs. This was due to a new GitHub token format containing hyphens, which Composer's validation regex failed to recognize, causing the full token to be printed in error messages. GitHub temporarily rolled back the new token format to allow the PHP ecosystem time to update Composer.

What If...?

Explore alternate histories. What if GitHub Actions Token Disclosure Incidents made different choices?

Explore Scenarios
Building relationship map...

People Also Ask

What is a GitHub Actions token disclosure incident?
A GitHub Actions token disclosure incident occurs when sensitive access tokens, such as the `GITHUB_TOKEN` or other secrets, are accidentally exposed in GitHub Actions workflows, logs, or artifacts. This can happen due to misconfigurations, vulnerabilities in third-party actions, or insecure coding practices.
Why are GitHub Actions tokens vulnerable?
Tokens can become vulnerable due to several factors, including over-privileged default permissions (historically), mutable action references that allow attackers to inject malicious code, accidental logging of secrets, and insecure handling of user inputs in workflows.
What are the consequences of a token disclosure?
Consequences can be severe, including unauthorized access to repositories, data exfiltration, intellectual property theft, code tampering, and lateral movement into integrated cloud environments or other internal systems. Attackers can use leaked tokens to launch further supply chain attacks.
What is GitHub doing to prevent token disclosures?
GitHub has implemented several measures, including setting default `GITHUB_TOKEN` permissions to read-only for new repositories, enforcing SHA pinning, and introducing immutable releases. Their 2026 security roadmap includes features like Deterministic Dependency Locking, Scoped Secrets, and a Native Egress Firewall.
How can users protect their GitHub Actions tokens?
Users should adopt best practices such as pinning all third-party actions to full commit SHAs, setting `GITHUB_TOKEN` permissions to the least privilege required, using OpenID Connect (OIDC) for cloud credentials, avoiding printing secrets to logs, and regularly auditing workflows for vulnerabilities.