home.social

#github-actions — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #github-actions, aggregated by home.social.

fetched live
  1. ▪ Also patched in legacy Composer 1.10.28 (upgrade to 2.x still recommended)

    🚑 Immediate actions:
    1️⃣ Run composer.phar self-update NOW
    2️⃣ Can't update? Disable #GitHubActions workflows running Composer
    3️⃣ Review CI logs for leaked tokens
    4️⃣ Delete any log contents containing raw token values before they expire

    📦 #Packagist.org is unaffected — no GitHub App involved. #PrivatePackagist applied the fix and audited logs: no tokens were exposed. Self-hosted PP is also unaffected.

  2. ▪ Also patched in legacy Composer 1.10.28 (upgrade to 2.x still recommended)

    🚑 Immediate actions:
    1️⃣ Run composer.phar self-update NOW
    2️⃣ Can't update? Disable #GitHubActions workflows running Composer
    3️⃣ Review CI logs for leaked tokens
    4️⃣ Delete any log contents containing raw token values before they expire

    📦 #Packagist.org is unaffected — no GitHub App involved. #PrivatePackagist applied the fix and audited logs: no tokens were exposed. Self-hosted PP is also unaffected.

  3. ▪ Also patched in legacy Composer 1.10.28 (upgrade to 2.x still recommended)

    🚑 Immediate actions:
    1️⃣ Run composer.phar self-update NOW
    2️⃣ Can't update? Disable #GitHubActions workflows running Composer
    3️⃣ Review CI logs for leaked tokens
    4️⃣ Delete any log contents containing raw token values before they expire

    📦 #Packagist.org is unaffected — no GitHub App involved. #PrivatePackagist applied the fix and audited logs: no tokens were exposed. Self-hosted PP is also unaffected.

  4. ▪ Also patched in legacy Composer 1.10.28 (upgrade to 2.x still recommended)

    🚑 Immediate actions:
    1️⃣ Run composer.phar self-update NOW
    2️⃣ Can't update? Disable #GitHubActions workflows running Composer
    3️⃣ Review CI logs for leaked tokens
    4️⃣ Delete any log contents containing raw token values before they expire

    📦 #Packagist.org is unaffected — no GitHub App involved. #PrivatePackagist applied the fix and audited logs: no tokens were exposed. Self-hosted PP is also unaffected.

  5. ▪ Also patched in legacy Composer 1.10.28 (upgrade to 2.x still recommended)

    🚑 Immediate actions:
    1️⃣ Run composer.phar self-update NOW
    2️⃣ Can't update? Disable #GitHubActions workflows running Composer
    3️⃣ Review CI logs for leaked tokens
    4️⃣ Delete any log contents containing raw token values before they expire

    📦 #Packagist.org is unaffected — no GitHub App involved. #PrivatePackagist applied the fix and audited logs: no tokens were exposed. Self-hosted PP is also unaffected.

  6. 🚨 #Composer 2.9.8 & 2.2.28 are out with an urgent security fix: #GitHub Actions GITHUB_TOKEN and GitHub App installation tokens were being leaked in plain text to CI job logs. If you run #Composer in #GitHubActions — update immediately.

    🧵👇 #PHP #security

    🔍 Root cause: Composer validates GitHub tokens against an allowed character set. When a token fails validation, the full token value was interpolated directly into the exception message — exposed on stderr and captured in CI logs.

  7. 🚨 #Composer 2.9.8 & 2.2.28 are out with an urgent security fix: #GitHub Actions GITHUB_TOKEN and GitHub App installation tokens were being leaked in plain text to CI job logs. If you run #Composer in #GitHubActions — update immediately.

    🧵👇 #PHP #security

    🔍 Root cause: Composer validates GitHub tokens against an allowed character set. When a token fails validation, the full token value was interpolated directly into the exception message — exposed on stderr and captured in CI logs.

  8. 🚨 #Composer 2.9.8 & 2.2.28 are out with an urgent security fix: #GitHub Actions GITHUB_TOKEN and GitHub App installation tokens were being leaked in plain text to CI job logs. If you run #Composer in #GitHubActions — update immediately.

    🧵👇 #PHP #security

    🔍 Root cause: Composer validates GitHub tokens against an allowed character set. When a token fails validation, the full token value was interpolated directly into the exception message — exposed on stderr and captured in CI logs.

  9. 🚨 #Composer 2.9.8 & 2.2.28 are out with an urgent security fix: #GitHub Actions GITHUB_TOKEN and GitHub App installation tokens were being leaked in plain text to CI job logs. If you run #Composer in #GitHubActions — update immediately.

    🧵👇 #PHP #security

    🔍 Root cause: Composer validates GitHub tokens against an allowed character set. When a token fails validation, the full token value was interpolated directly into the exception message — exposed on stderr and captured in CI logs.

  10. 🚨 #Composer 2.9.8 & 2.2.28 are out with an urgent security fix: #GitHub Actions GITHUB_TOKEN and GitHub App installation tokens were being leaked in plain text to CI job logs. If you run #Composer in #GitHubActions — update immediately.

    🧵👇 #PHP #security

    🔍 Root cause: Composer validates GitHub tokens against an allowed character set. When a token fails validation, the full token value was interpolated directly into the exception message — exposed on stderr and captured in CI logs.

  11. 🎉 BREAKING: GitHub accidentally leaks its own token in Actions logs! 🎉 It's like they finally decided to play hide and seek, but forgot the 'hide' part. 🤦‍♂️ GitHub devs now busy inventing new ways to accidentally leave the #backdoor open. 🚪🔓
    github.com/composer/composer/s #GitHubLeaks #GitHubActions #SecurityBreach #DevOps #Failures #HackerNews #ngated

  12. 🎉 BREAKING: GitHub accidentally leaks its own token in Actions logs! 🎉 It's like they finally decided to play hide and seek, but forgot the 'hide' part. 🤦‍♂️ GitHub devs now busy inventing new ways to accidentally leave the #backdoor open. 🚪🔓
    github.com/composer/composer/s #GitHubLeaks #GitHubActions #SecurityBreach #DevOps #Failures #HackerNews #ngated

  13. 🎉 BREAKING: GitHub accidentally leaks its own token in Actions logs! 🎉 It's like they finally decided to play hide and seek, but forgot the 'hide' part. 🤦‍♂️ GitHub devs now busy inventing new ways to accidentally leave the #backdoor open. 🚪🔓
    github.com/composer/composer/s #GitHubLeaks #GitHubActions #SecurityBreach #DevOps #Failures #HackerNews #ngated

  14. 🎉 BREAKING: GitHub accidentally leaks its own token in Actions logs! 🎉 It's like they finally decided to play hide and seek, but forgot the 'hide' part. 🤦‍♂️ GitHub devs now busy inventing new ways to accidentally leave the #backdoor open. 🚪🔓
    github.com/composer/composer/s #GitHubLeaks #GitHubActions #SecurityBreach #DevOps #Failures #HackerNews #ngated

  15. 🎉 BREAKING: GitHub accidentally leaks its own token in Actions logs! 🎉 It's like they finally decided to play hide and seek, but forgot the 'hide' part. 🤦‍♂️ GitHub devs now busy inventing new ways to accidentally leave the #backdoor open. 🚪🔓
    github.com/composer/composer/s #GitHubLeaks #GitHubActions #SecurityBreach #DevOps #Failures #HackerNews #ngated

  16. RE: infosec.exchange/@cidu/1165638

    Again, with #github #githubactions at the center of another PR driven compromise?

    You would think their wonderful #AI would catch these by now if they're not going to fix the underlying problem.

    Is it called #copilot too??

  17. RE: infosec.exchange/@cidu/1165638

    Again, with #github #githubactions at the center of another PR driven compromise?

    You would think their wonderful #AI would catch these by now if they're not going to fix the underlying problem.

    Is it called #copilot too??

  18. RE: infosec.exchange/@cidu/1165638

    Again, with #github #githubactions at the center of another PR driven compromise?

    You would think their wonderful #AI would catch these by now if they're not going to fix the underlying problem.

    Is it called #copilot too??

  19. RE: infosec.exchange/@cidu/1165638

    Again, with #github #githubactions at the center of another PR driven compromise?

    You would think their wonderful #AI would catch these by now if they're not going to fix the underlying problem.

    Is it called #copilot too??

  20. RE: infosec.exchange/@cidu/1165638

    Again, with #github #githubactions at the center of another PR driven compromise?

    You would think their wonderful #AI would catch these by now if they're not going to fix the underlying problem.

    Is it called #copilot too??

  21. 84 npm versions published by an attacker in 12 hours.
    Without stealing a single declared token.

    On May 11, an operator forked TanStack/router on GitHub, opened a Pull Request, and triggered a three-stage attack chain:

    → Misconfigured pull_request_target
    → Arbitrary code execution with internal privileges
    → Poisoned GitHub Actions cache → pivot into the release workflow
    → OIDC token extracted via /proc/mem on the runner
    → Publish under the org's legitimate identity

    Outcome: 42 packages compromised, 84 malicious versions live.
    External detection in 20 minutes (StepSecurity / carlini).
    TanStack's internal monitoring never saw the incident.

    Our full analysis: the attack chain, the Shai-Hulud / tj-actions lineage, and the defensive checklist (workflows, cache, OIDC, ephemeral runners).

    cidu.io/articles/tanstack-npm-

    #SupplyChain #Cybersecurity #npm #DevSecOps #ThreatIntel #GitHubActions #SOC

  22. 84 npm versions published by an attacker in 12 hours.
    Without stealing a single declared token.

    On May 11, an operator forked TanStack/router on GitHub, opened a Pull Request, and triggered a three-stage attack chain:

    → Misconfigured pull_request_target
    → Arbitrary code execution with internal privileges
    → Poisoned GitHub Actions cache → pivot into the release workflow
    → OIDC token extracted via /proc/mem on the runner
    → Publish under the org's legitimate identity

    Outcome: 42 packages compromised, 84 malicious versions live.
    External detection in 20 minutes (StepSecurity / carlini).
    TanStack's internal monitoring never saw the incident.

    Our full analysis: the attack chain, the Shai-Hulud / tj-actions lineage, and the defensive checklist (workflows, cache, OIDC, ephemeral runners).

    cidu.io/articles/tanstack-npm-

    #SupplyChain #Cybersecurity #npm #DevSecOps #ThreatIntel #GitHubActions #SOC

  23. 84 npm versions published by an attacker in 12 hours.
    Without stealing a single declared token.

    On May 11, an operator forked TanStack/router on GitHub, opened a Pull Request, and triggered a three-stage attack chain:

    → Misconfigured pull_request_target
    → Arbitrary code execution with internal privileges
    → Poisoned GitHub Actions cache → pivot into the release workflow
    → OIDC token extracted via /proc/mem on the runner
    → Publish under the org's legitimate identity

    Outcome: 42 packages compromised, 84 malicious versions live.
    External detection in 20 minutes (StepSecurity / carlini).
    TanStack's internal monitoring never saw the incident.

    Our full analysis: the attack chain, the Shai-Hulud / tj-actions lineage, and the defensive checklist (workflows, cache, OIDC, ephemeral runners).

    cidu.io/articles/tanstack-npm-

    #SupplyChain #Cybersecurity #npm #DevSecOps #ThreatIntel #GitHubActions #SOC

  24. 84 npm versions published by an attacker in 12 hours.
    Without stealing a single declared token.

    On May 11, an operator forked TanStack/router on GitHub, opened a Pull Request, and triggered a three-stage attack chain:

    → Misconfigured pull_request_target
    → Arbitrary code execution with internal privileges
    → Poisoned GitHub Actions cache → pivot into the release workflow
    → OIDC token extracted via /proc/mem on the runner
    → Publish under the org's legitimate identity

    Outcome: 42 packages compromised, 84 malicious versions live.
    External detection in 20 minutes (StepSecurity / carlini).
    TanStack's internal monitoring never saw the incident.

    Our full analysis: the attack chain, the Shai-Hulud / tj-actions lineage, and the defensive checklist (workflows, cache, OIDC, ephemeral runners).

    cidu.io/articles/tanstack-npm-

    #SupplyChain #Cybersecurity #npm #DevSecOps #ThreatIntel #GitHubActions #SOC

  25. 84 npm versions published by an attacker in 12 hours.
    Without stealing a single declared token.

    On May 11, an operator forked TanStack/router on GitHub, opened a Pull Request, and triggered a three-stage attack chain:

    → Misconfigured pull_request_target
    → Arbitrary code execution with internal privileges
    → Poisoned GitHub Actions cache → pivot into the release workflow
    → OIDC token extracted via /proc/mem on the runner
    → Publish under the org's legitimate identity

    Outcome: 42 packages compromised, 84 malicious versions live.
    External detection in 20 minutes (StepSecurity / carlini).
    TanStack's internal monitoring never saw the incident.

    Our full analysis: the attack chain, the Shai-Hulud / tj-actions lineage, and the defensive checklist (workflows, cache, OIDC, ephemeral runners).

    cidu.io/articles/tanstack-npm-

    #SupplyChain #Cybersecurity #npm #DevSecOps #ThreatIntel #GitHubActions #SOC

  26. @ct do you mean between self hosting Forgejo or use Codeberg? I’m a bit surprised to hear there are CI limitations, because in both cases you still need runners to execute jobs, same as on github. My understanding is that Forgejo itself already has “Actions”/CI support.

    #codeberg #forgejo #github #githubactions

  27. @ct do you mean between self hosting Forgejo or use Codeberg? I’m a bit surprised to hear there are CI limitations, because in both cases you still need runners to execute jobs, same as on github. My understanding is that Forgejo itself already has “Actions”/CI support.

    #codeberg #forgejo #github #githubactions

  28. @ct do you mean between self hosting Forgejo or use Codeberg? I’m a bit surprised to hear there are CI limitations, because in both cases you still need runners to execute jobs, same as on github. My understanding is that Forgejo itself already has “Actions”/CI support.

    #codeberg #forgejo #github #githubactions

  29. GitHub Actions’ Windows hosted runner migration to Visual Studio 2026 starts soon

    GitHub has recently planned a migration process for those who are using the Windows workflows in their GitHub-hosted Actions instances that migrates the installation of Visual Studio 2022 to the newer Visual Studio 2026. The windows-latest and windows-2025 runner images will use Visual Studio 2026, starting from June 8th, 2026.

    The February 2026 announcement post stated that there’s a newer runner image that focuses on using Visual Studio 2026 as a public preview. As the windows-2025 runner image has reached general availability on May 4th, it used Visual Studio 2026 as the integrated development environment instead of Visual Studio 2022.

    Starting from June 8th, 2026, the rollout is expected to end by June 15th, 2026. The workflows will gradually shift over to the newer Visual Studio 2026 IDE instead of the older VS2022 version. However, for those who are still depending on the older Visual Studio 2022 IDE, manual adjustments are needed to ensure that the migration to VS2026 is complete without any issues, as things might break during the migration process.

    In most situations, you won’t need to do anything, as the migration happens transparently. However, in case things break after migration, you’ll have to perform some changes to ensure that workflows continue to work even after migration.

    #github #GitHubActions #news #Tech #Technology #update #visualStudio #VisualStudio2026 #Windows #Windows11
  30. GitHub Actions’ Windows hosted runner migration to Visual Studio 2026 starts soon

    GitHub has recently planned a migration process for those who are using the Windows workflows in their GitHub-hosted Actions instances that migrates the installation of Visual Studio 2022 to the newer Visual Studio 2026. The windows-latest and windows-2025 runner images will use Visual Studio 2026, starting from June 8th, 2026.

    The February 2026 announcement post stated that there’s a newer runner image that focuses on using Visual Studio 2026 as a public preview. As the windows-2025 runner image has reached general availability on May 4th, it used Visual Studio 2026 as the integrated development environment instead of Visual Studio 2022.

    Starting from June 8th, 2026, the rollout is expected to end by June 15th, 2026. The workflows will gradually shift over to the newer Visual Studio 2026 IDE instead of the older VS2022 version. However, for those who are still depending on the older Visual Studio 2022 IDE, manual adjustments are needed to ensure that the migration to VS2026 is complete without any issues, as things might break during the migration process.

    In most situations, you won’t need to do anything, as the migration happens transparently. However, in case things break after migration, you’ll have to perform some changes to ensure that workflows continue to work even after migration.

    #github #GitHubActions #news #Tech #Technology #update #visualStudio #VisualStudio2026 #Windows #Windows11
  31. GitHub Actions’ Windows hosted runner migration to Visual Studio 2026 starts soon

    GitHub has recently planned a migration process for those who are using the Windows workflows in their GitHub-hosted Actions instances that migrates the installation of Visual Studio 2022 to the newer Visual Studio 2026. The windows-latest and windows-2025 runner images will use Visual Studio 2026, starting from June 8th, 2026.

    The February 2026 announcement post stated that there’s a newer runner image that focuses on using Visual Studio 2026 as a public preview. As the windows-2025 runner image has reached general availability on May 4th, it used Visual Studio 2026 as the integrated development environment instead of Visual Studio 2022.

    Starting from June 8th, 2026, the rollout is expected to end by June 15th, 2026. The workflows will gradually shift over to the newer Visual Studio 2026 IDE instead of the older VS2022 version. However, for those who are still depending on the older Visual Studio 2022 IDE, manual adjustments are needed to ensure that the migration to VS2026 is complete without any issues, as things might break during the migration process.

    In most situations, you won’t need to do anything, as the migration happens transparently. However, in case things break after migration, you’ll have to perform some changes to ensure that workflows continue to work even after migration.

    #github #GitHubActions #news #Tech #Technology #update #visualStudio #VisualStudio2026 #Windows #Windows11
  32. GitHub Actions’ Windows hosted runner migration to Visual Studio 2026 starts soon

    GitHub has recently planned a migration process for those who are using the Windows workflows in their GitHub-hosted Actions instances that migrates the installation of Visual Studio 2022 to the newer Visual Studio 2026. The windows-latest and windows-2025 runner images will use Visual Studio 2026, starting from June 8th, 2026.

    The February 2026 announcement post stated that there’s a newer runner image that focuses on using Visual Studio 2026 as a public preview. As the windows-2025 runner image has reached general availability on May 4th, it used Visual Studio 2026 as the integrated development environment instead of Visual Studio 2022.

    Starting from June 8th, 2026, the rollout is expected to end by June 15th, 2026. The workflows will gradually shift over to the newer Visual Studio 2026 IDE instead of the older VS2022 version. However, for those who are still depending on the older Visual Studio 2022 IDE, manual adjustments are needed to ensure that the migration to VS2026 is complete without any issues, as things might break during the migration process.

    In most situations, you won’t need to do anything, as the migration happens transparently. However, in case things break after migration, you’ll have to perform some changes to ensure that workflows continue to work even after migration.

    #github #GitHubActions #news #Tech #Technology #update #visualStudio #VisualStudio2026 #Windows #Windows11
  33. GitHub Actions’ Windows hosted runner migration to Visual Studio 2026 starts soon

    GitHub has recently planned a migration process for those who are using the Windows workflows in their GitHub-hosted Actions instances that migrates the installation of Visual Studio 2022 to the newer Visual Studio 2026. The windows-latest and windows-2025 runner images will use Visual Studio 2026, starting from June 8th, 2026.

    The February 2026 announcement post stated that there’s a newer runner image that focuses on using Visual Studio 2026 as a public preview. As the windows-2025 runner image has reached general availability on May 4th, it used Visual Studio 2026 as the integrated development environment instead of Visual Studio 2022.

    Starting from June 8th, 2026, the rollout is expected to end by June 15th, 2026. The workflows will gradually shift over to the newer Visual Studio 2026 IDE instead of the older VS2022 version. However, for those who are still depending on the older Visual Studio 2022 IDE, manual adjustments are needed to ensure that the migration to VS2026 is complete without any issues, as things might break during the migration process.

    In most situations, you won’t need to do anything, as the migration happens transparently. However, in case things break after migration, you’ll have to perform some changes to ensure that workflows continue to work even after migration.

    #github #GitHubActions #news #Tech #Technology #update #visualStudio #VisualStudio2026 #Windows #Windows11
  34. RE: code4lib.social/@acdha/1165588

    Do not use pull_request_target.
    Do not use caches in publish workflows.
    Use dependency cooldowns.
    Use Zizmor.
    Tell GitHub to make Actions secure by default.
    #GitHub #GitHubActions

  35. RE: code4lib.social/@acdha/1165588

    Do not use pull_request_target.
    Do not use caches in publish workflows.
    Use dependency cooldowns.
    Use Zizmor.
    Tell GitHub to make Actions secure by default.
    #GitHub #GitHubActions

  36. RE: code4lib.social/@acdha/1165588

    Do not use pull_request_target.
    Do not use caches in publish workflows.
    Use dependency cooldowns.
    Use Zizmor.
    Tell GitHub to make Actions secure by default.
    #GitHub #GitHubActions

  37. RE: code4lib.social/@acdha/1165588

    Do not use pull_request_target.
    Do not use caches in publish workflows.
    Use dependency cooldowns.
    Use Zizmor.
    Tell GitHub to make Actions secure by default.
    #GitHub #GitHubActions

  38. RE: code4lib.social/@acdha/1165588

    Do not use pull_request_target.
    Do not use caches in publish workflows.
    Use dependency cooldowns.
    Use Zizmor.
    Tell GitHub to make Actions secure by default.
    #GitHub #GitHubActions