ruby.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
If you are interested in the Ruby programming language, come join us! Tell us about yourself when signing up. If you just want to join Mastodon, another server will be a better place for you.

Administered by:

Server stats:

1.1K
active users

#githubactions

2 posts2 participants0 posts today

Oh no, not another soul lost in the GitHub Actions Bermuda Triangle 🙄🔍. Apparently, someone decided it was a great idea to leave the backdoor open to their secret garden of mysteries. Who needs secure coding practices when you can just sprinkle some malicious pixie dust and watch chaos ensue? 🎩✨
alexwlchan.net/2025/github-act #GitHubActions #SecurityBreach #CodingPractices #SoftwareDevelopment #TechHumor #DevOps #HackerNews #ngated

alexwlchan.netWhose code am I running in GitHub Actions?I wanted to know what third-party code I was using in my GitHub Actions. I was able to use standard text processing tools and shell pipelines to get a quick tally.

(horizon3.ai) What to know about recent Github Actions and Apache Tomcat vulnerabilities—before you investigate horizon3.ai/attack-research/at

The article from Horizon3 analyzes two recent high-profile vulnerabilities: CVE-2025-30066 affecting GitHub Actions (tj-actions/changed-files) and CVE-2025-24813 affecting Apache Tomcat. Despite widespread publicity, Horizon3.ai's Attack Team found that actual exploitation risk is significantly lower than reported. For the GitHub Actions vulnerability, only one repository among 1,200 examined was exposed, with no evidence of data exfiltration. For Apache Tomcat, analysis of over 10,000 endpoints revealed no vulnerable configurations in production environments. The article emphasizes the importance of prioritizing security responses based on actual risk rather than media hype.

Red alarm light against a metal wall with vertical ridges
Horizon3.ai · GitHub Actions & Apache Tomcat CVEs: Risk or Hype?Explore CVE-2025-30066 and CVE-2025-24813 with real-world data from Horizon3.ai to assess whether these vulnerabilities are truly critical or overhyped.

If you work with GitHub Actions and have used actions to commit to a branch, you may have run into this little problem I ran into today: automatically generated commits and events triggered by a workflow, do not trigger any workflow.

In practice, that means that if you used a workflow to add a commit to your Pull Request, CI will not be triggered after that commit is pushed. All the events and CI that you would expect to see run on your Pull Request will not be triggered until your next push.

This is done on purpose by GitHub, as per the docs:

When you use the repository’s GITHUB_TOKEN to perform tasks, events triggered by the GITHUB_TOKEN, with the exception of workflow_dispatch and repository_dispatch, will not create a new workflow run. This prevents you from accidentally creating recursive workflow runs. For example, if a workflow run pushes code using the repository’s GITHUB_TOKEN, a new workflow will not run even when the repository contains a workflow configured to run when push events occur.

Automatic token authentication

A possible work-around in such cases is to use a personal access token instead of the default GITHUB_TOKEN to trigger events that require a token.

In my situation, I am using actions/github-script and its authenticated Octokit client. Specifically, I use createOrUpdateFileContents to add a new file, commit it, and push it to the branch. actions/github-script allows using the github-token input to pass your own custom token, so I used that:

uses: actions/github-script@v7  with:    github-token: ${{ secrets.API_TOKEN_GITHUB }}    script: |

The generated commit now happens in my name, and CI events are triggered as expected by that commit.

GitHub DocsAutomatic token authentication - GitHub DocsGitHub provides a token that you can use to authenticate on behalf of GitHub Actions.