Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Prompt Injection Vulnerability in GitHub Actions Hits Fortune 500 Firms

Prompt Injection Vulnerability in GitHub Actions Hits Fortune 500 Firms

Posted on December 4, 2025December 4, 2025 By CWS

A brand new class of immediate injection vulnerabilities, dubbed “PromptPwnd,” has been uncovered by cybersecurity agency Aikido Safety.

The issues have an effect on GitHub Actions and GitLab CI/CD pipelines which might be built-in with AI brokers, together with Google’s Gemini CLI, Claude Code, and OpenAI Codex. The vulnerability has been confirmed to impression not less than 5 Fortune 500 firms, with proof suggesting the difficulty is widespread.

Aikido Safety, which first recognized and disclosed this vulnerability sample, has open-sourced Opengrep guidelines to assist safety distributors detect the flaw.

The vulnerability sample includes untrusted consumer enter being injected into AI prompts, permitting the AI agent to execute privileged instructions, which might result in the leakage of secrets and techniques or manipulation of workflows. This marks the primary confirmed real-world demonstration of AI immediate injection efficiently compromising CI/CD pipelines.

Immediate Injection Flaw in GitHub Actions

The assault leverages the growing integration of AI into software program growth workflows for duties like computerized situation triage and pull request labeling.

The vulnerability arises when untrusted content material from sources like GitHub situation titles or our bodies is instantly fed into AI prompts. An attacker can embed malicious directions inside this content material.

GitHub Workflows Vulnerability

The AI mannequin then misinterprets these directions as instructions, not knowledge, and makes use of its built-in instruments to carry out unauthorized actions. This could embrace modifying pull requests or, in additional extreme circumstances, exfiltrating delicate credentials and API keys.

A chief instance of this vulnerability was present in Google’s personal Gemini CLI repository. The workflow handed untrusted consumer enter from GitHub points instantly into the mannequin immediate.

Aikido Safety created a proof-of-concept by submitting a malicious situation with hidden directions. The AI agent interpreted these directions and executed a command to edit the difficulty, embedding delicate API keys and tokens instantly into the difficulty physique, thereby exposing them. Following Aikido’s accountable disclosure, Google patched the vulnerability inside 4 days.

This vulnerability will not be remoted to a single AI agent. Researchers discovered that related architectural patterns exist throughout many AI-powered GitHub Actions, together with Claude Code Actions and OpenAI Codex Actions, particularly when safety settings are misconfigured to permit non-privileged customers to set off workflows.

To handle the “PromptPwnd” vulnerability, Aikido Safety recommends a number of remediation steps. Organizations ought to limit the toolset out there to AI brokers, avoiding instruments that may write to points or pull requests.

Additionally it is essential to keep away from injecting untrusted consumer enter into AI prompts, or to sanitize and totally validate it if unavoidable. Moreover, all output generated by AI ought to be handled as untrusted code and never executed with out validation.

Limiting the entry of GitHub tokens by IP tackle also can assist limit the potential injury from leaked credentials. Aikido affords a free software to scan GitHub and GitLab repositories for this vulnerability, and builders also can use open-source instruments to verify their .yml information.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actions, Firms, Fortune, GitHub, Hits, Injection, Prompt, Vulnerability

Post navigation

Previous Post: Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
Next Post: Cybersecurity M&A Roundup: 30 Deals Announced in November 2025

Related Posts

AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More Cyber Security News
New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT Cyber Security News
Critical TP-Link Vulnerabilities Demand Immediate Firmware Updates Critical TP-Link Vulnerabilities Demand Immediate Firmware Updates Cyber Security News
25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks Cyber Security News
PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation Cyber Security News
LangChainGo Vulnerability Let Attackers Access Sensitive Files LangChainGo Vulnerability Let Attackers Access Sensitive Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News