Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Prompt Injection Vulnerability in GitHub Actions Hits Fortune 500 Firms

Posted on December 4, 2025December 4, 2025 By CWS

A brand new class of immediate injection vulnerabilities, dubbed “PromptPwnd,” has been uncovered by cybersecurity agency Aikido Safety.

The issues have an effect on GitHub Actions and GitLab CI/CD pipelines which might be built-in with AI brokers, together with Google’s Gemini CLI, Claude Code, and OpenAI Codex. The vulnerability has been confirmed to impression not less than 5 Fortune 500 firms, with proof suggesting the difficulty is widespread.

Aikido Safety, which first recognized and disclosed this vulnerability sample, has open-sourced Opengrep guidelines to assist safety distributors detect the flaw.

The vulnerability sample includes untrusted consumer enter being injected into AI prompts, permitting the AI agent to execute privileged instructions, which might result in the leakage of secrets and techniques or manipulation of workflows. This marks the primary confirmed real-world demonstration of AI immediate injection efficiently compromising CI/CD pipelines.

Immediate Injection Flaw in GitHub Actions

The assault leverages the growing integration of AI into software program growth workflows for duties like computerized situation triage and pull request labeling.

The vulnerability arises when untrusted content material from sources like GitHub situation titles or our bodies is instantly fed into AI prompts. An attacker can embed malicious directions inside this content material.

GitHub Workflows Vulnerability

The AI mannequin then misinterprets these directions as instructions, not knowledge, and makes use of its built-in instruments to carry out unauthorized actions. This could embrace modifying pull requests or, in additional extreme circumstances, exfiltrating delicate credentials and API keys.

A chief instance of this vulnerability was present in Google’s personal Gemini CLI repository. The workflow handed untrusted consumer enter from GitHub points instantly into the mannequin immediate.

Aikido Safety created a proof-of-concept by submitting a malicious situation with hidden directions. The AI agent interpreted these directions and executed a command to edit the difficulty, embedding delicate API keys and tokens instantly into the difficulty physique, thereby exposing them. Following Aikido’s accountable disclosure, Google patched the vulnerability inside 4 days.

This vulnerability will not be remoted to a single AI agent. Researchers discovered that related architectural patterns exist throughout many AI-powered GitHub Actions, together with Claude Code Actions and OpenAI Codex Actions, particularly when safety settings are misconfigured to permit non-privileged customers to set off workflows.

To handle the “PromptPwnd” vulnerability, Aikido Safety recommends a number of remediation steps. Organizations ought to limit the toolset out there to AI brokers, avoiding instruments that may write to points or pull requests.

Additionally it is essential to keep away from injecting untrusted consumer enter into AI prompts, or to sanitize and totally validate it if unavoidable. Moreover, all output generated by AI ought to be handled as untrusted code and never executed with out validation.

Limiting the entry of GitHub tokens by IP tackle also can assist limit the potential injury from leaked credentials. Aikido affords a free software to scan GitHub and GitLab repositories for this vulnerability, and builders also can use open-source instruments to verify their .yml information.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actions, Firms, Fortune, GitHub, Hits, Injection, Prompt, Vulnerability

Post navigation

Previous Post: Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
Next Post: Cybersecurity M&A Roundup: 30 Deals Announced in November 2025

Related Posts

Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS Cyber Security News
OpenAI Launches $4 ChatGPT Go Plan with Unlimited Access to GPT-5 Cyber Security News
New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News
Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life Cyber Security News
New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network Cyber Security News
Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark