[Eclipse iceoryx] Security Breach in tj-actions/changed-files GitHub Action
Summary of the Issue
The tj-actions/changed-files GitHub Action has been compromised. Attackers modified the Action’s code and retroactively updated multiple version tags to reference a malicious commit. This compromised Action has been found to expose CI/CD secrets in GitHub Actions build logs. If these logs are public, anyone can access and steal these secrets.
GitHub has since removed the affected Action, and a secure replacement is available. However, any secrets exposed in your workflow logs should be treated as compromised and rotated immediately.
The compromise of tj-actions/changed-files was potentially due to a similar compromise of another GitHub Action, reviewdog/action-setup@v1. The following Actions may also be affected:
reviewdog/action-shellcheckreviewdog/action-composite-templatereviewdog/action-staticcheckreviewdog/action-ast-grepreviewdog/action-typos
Our Progress to Date
We have identified the following workflows with potential risk:
- https://github.com/eclipse-iceoryx/iceoryx2/blob/main/.github/workflows/miri-check.yml (tj-actions/changed-files@v45)
We examined the workflow runs that occurred within the timeframe when the compromised actions were infected.
- 2025-03-10T10:36:24Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13762585530
- 2025-03-10T10:55:16Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13762927928
- 2025-03-10T13:45:19Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13766211821
- 2025-03-11T14:00:46Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13789926283
- 2025-03-11T14:27:17Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13790521758
- 2025-03-11T15:42:20Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13792218981
- 2025-03-11T15:53:23Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13792457927
- 2025-03-11T17:39:43Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13794604630
- 2025-03-12T12:46:31Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13811706323
- 2025-03-12T12:50:43Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13811786756
- 2025-03-12T14:27:14Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13813834294
- 2025-03-12T16:57:10Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13817106134
- 2025-03-12T17:14:51Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13817464246
- 2025-03-12T18:11:12Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13818523543
- 2025-03-12T20:21:07Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13820792602
- 2025-03-13T05:20:27Z https://github.com/eclipse-iceoryx/iceoryx2/actions/runs/13827644522
These analyses revealed no potential leaks.
Immediate Actions to Take
-
Review our Workflow Runs Logs Analysis
It is possible that we missed something.
At this time, potential indicators of compromise we are aware of are the appearance of secret hashes in workflow runs logs for steps using the compromised actions above. Kindly review the logs for steps involving:
tj-actions/changed-files:- Check for hashes under log lines containing “
changed-files” text - Example: in this article under “Review GitHub Actions Workflow Run Logs”
-
reviewdog/*:- Check for hashes in step logs
- Example: in this article under “Summary of the incident”
- Rotate Potentially Compromised Secrets
- If you see something suspicious, identify all secrets used the workflow.
- Identify which ones are managed by Eclipse Foundation and which ones are controlled by your team.
- For all secrets controlled by your team
- Generate new secrets and send us updates via standard procedure: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Sharing-secrets. Please mention in the email that the change is requested after a potential compromise of the secret
- Revoke those exposed credentials you control to prevent unauthorized access.
- For all secrets controlled by the Eclipse Foundation, please share with us the list of secrets names to be rotated and revoked.
- Update Your Workflows to Use a Secure Replacement
Replace all instances of tj-actions/changed-files and others with patched versions, using the specific commit hash instead of version tags to mitigate against future supply chain attacks:
tj-actions/changed-files@2f7c5bfce28377bc069a65ba478de0a74aa0ca32 # v46.0.1
If you really need to use tags (not recommended), you can use:
tj-actions/changed-files@v46.0.1
- Delete Logs Containing Secrets
If secrets were exposed in workflow logs, delete the affected logs immediately to prevent further exposure.
- Review Your Project’s Configuration and Stay Alert
Review the configuration of your projects and watch out for actions that might have been already performed with those exposed secrets. Such actions could potentially include, but are not limited to (depending on the secrets exposed):
- Modify project’s artefacts (like release tarballs)
- Add commits or tags
- Change links in Project’s documentation
Next steps
To avoid supply chain threats, update all GitHub actions tags to use commit hash instead. Dependabot can manage action updates, including commit hash. The Eclipse Foundation Security Team offers tooling to pin all your workflows at once and ensure they stay that way.
Additional Resources
- StepSecurity: Initial report on Harden Runner detection and the compromise of the tj-actions changed-files action Step Security
- GitHub: Advisory GHSA-mrrh-fwg8-r2c3 https://github.com/advisories/GHSA-mrrh-fwg8-r2c3
- Hacker News: News report on CISA's warning of active exploitation https://thehackernews.com/2025/03/cisa-warns-of-active-exploitation-in.html
- CISA: Alert on supply chain compromise involving a third-party GitHub action (CVE-2025-30066) https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-github-action-cve-2025-30066
- Wiz: Further analysis of the new GitHub action supply chain attack and the reviewdog-action-setup https://www.wiz.io/blog/new-github-action-supply-chain-attack-reviewdog-action-setup
- GitHub: Advisory for Reviewdog GHSA-qmg3-hpqr-gqvc https://github.com/reviewdog/reviewdog/security/advisories/GHSA-qmg3-hpqr-gqvc

