tj-actions/changed-files
, which was compromised to leak sensitive credentials from over 23,000 repositories.
The breach, first detected by StepSecurity on March 14, involved an attacker gaining access to a GitHub automation account. By modifying the code within the Action, the attacker exposed developer “secrets” like API tokens, encryption keys, and passwords to public logs—a severe threat to both security and trust across software supply chains.
Although GitHub has since removed and restored the tool after eliminating the malicious code, the incident highlights a fundamental vulnerability in the open-source ecosystem: reliance on unaudited third-party tools. As Varun Sharma of StepSecurity noted, this incident could open the floodgates to a rise in credential-based supply chain attacks.
This is where Blackswan Cybersecurity steps in. With over 30 years of experience and a proven record of protecting both public and private organizations, we specialize in supply chain risk management, threat detection, and continuous monitoring. Our 24/7 Cyber Fusion Center, powered by Managed Detection and Response (MDR), actively monitors for suspicious activity and enables real-time responses to credential misuse and code injection threats.
From public education and municipalities to industries such as automotive, legal, and other SMBs that are targeted due to limited internal security teams—our right-sized, cost-effective solutions offer enterprise-grade protection without the complexity. Maintaining secure software development pipelines is crucial to operational continuity and customer trust.
Key Takeaways:
- Always vet third-party Actions or Packages before integrating them into your workflow.
- Regularly rotate and audit exposed credentials.
- Implement real-time monitoring and automated detection systems.
Let Blackswan help you safeguard your software supply chain. Our proactive, AI-enhanced defenses ensure that your repositories, cloud services, and infrastructure stay protected against the next wave of sophisticated attacks.
Reference: