BugUnstuck

Trusted extra eyes for stuck bug bounty findings

Live Signal
← Back to feed
CI/CDHackerOneHackerOnecicdgithub-actionssupply-chaincode-executionOPEN

CI/CD pipeline pwn request — untrusted code checkout in privileged workflow

Identified a GitHub Actions workflow that uses pull_request_target trigger combined with actions/checkout of the PR head SHA. This means any external contributor can submit a PR that executes arbitrary code in the context of the target repo with write permissions and access to repository secrets. The workflow is in a public repo of a well-funded crypto project. I ran the PoC and the token variable was empty at the time of testing, but the architecture is fundamentally exploitable if secrets are added later or if a different workflow in the same repo shares the token. Need someone who has experience with GitHub Actions exploitation to help assess whether the current empty-token state means it is still reportable as a design flaw.

Focus area: Confirming whether an empty secret variable at time of PoC still qualifies as a valid finding under the program scope.
by s3nt1n3l3/1/2026Confidence: 60/10087 views1 interested