GitHub Actions Pwn Request Vulnerability
Securing GitHub Actions: Understanding and Mitigating the 'Pwn Request' Vulnerability
Easily implement network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
Fix risky configurations and enforce best practices for GitHub Actions CI/CD pipeline as code files with automated remediation pull requests.
Build with security as a default through StepSecurity’s secure alternatives to third-party GitHub actions: Maintained Actions.
Starting November 8, 2024, 6:32 PM UTC, StepSecurity Harden-Runner detected unusual outbound network traffic to an unknown domain from multiple GitHub Actions workflow runs across several customers. This systemic incident underscores the importance of real-time monitoring and network visibility for CI/CD runners, showcasing Harden-Runner's effectiveness in identifying and addressing security anomalies.