In partnership with

Modern software isn’t built alone, it’s assembled from open-source dependencies, automation workflows, and CI/CD pipelines. This interconnected system, known as the software supply chain, has become one of the most attractive targets for attackers.

Attackers are targeting your automation, not just your code, and GitHub is redesigning its platform to respond.

Why Supply Chain Attacks Focus on GitHub Actions

A key insight from GitHub’s own security guidance:

—> Many attacks start by looking for exploitable GitHub Actions workflows.

Why?

  • Workflows often run with high privileges

  • They can access secrets and tokens

  • They automatically execute code from pull requests or dependencies

If misconfigured, a workflow becomes a direct entry point into your system.

GitHub’s Security Direction: Safer by Default

GitHub is shifting toward a model where security is built-in, not optional.

Their strategy focuses on:

1. Reducing implicit trust

  • Limiting default permissions of workflows

  • Encouraging explicit approvals and scoped access

2. Controlling execution

  • Tightening when and how workflows run

  • Preventing untrusted code from executing automatically

3. Increasing visibility

  • Improving audit logs and monitoring of workflow activity

4. Strengthening dependency integrity

  • Detecting vulnerable or compromised dependencies early

—> The goal: minimize the damage even if something goes wrong

Key Technical Improvements in the 2026 Roadmap

GitHub’s upcoming improvements focus heavily on GitHub Actions security:

Dependency & workflow integrity

  • Better mechanisms to ensure workflows use trusted, immutable references

  • Support for stronger dependency controls (e.g., pinning and verification)

Fine-grained permissions

  • More control over what workflows can access

  • Movement toward least-privilege by default

Execution safeguards

  • Protections against running untrusted code automatically

  • Safer handling of contributions from forks

Improved observability

  • Better insight into workflow runs and behavior

  • Enhanced auditability for investigations

Network controls (planned direction)

  • Limiting outbound connections from workflows

  • Reducing risk of data exfiltration

What Developers Often Miss

Even with platform improvements, most real-world attacks succeed because of misconfigurations.

Common weak points:

  • Trusting user input inside workflows

  • Using unpinned third-party actions

  • Overexposing secrets

  • Triggering workflows in unsafe contexts

What You Should Do Today (Critical Actions)

These are direct, practical steps based on GitHub’s official guidance.

1. Enable CodeQL for workflow security

—> This is the single most important step

  • Use CodeQL to analyze your repository

  • It can detect security issues in GitHub Actions workflows

  • Available for free on public repositories

2. Avoid dangerous workflow triggers

🚫 Do NOT use pull_request_target unless absolutely necessary

  • It runs with elevated permissions

  • It can execute untrusted code from forks

—> This is one of the most common entry points for attacks

3. Pin third-party GitHub Actions

Always pin actions like this:

uses: some/action@a1b2c3d4e5f6...

✔ Use full-length commit SHAs
✔ Avoid tags like v1 or latest

⚠️ Be cautious:

  • Review any pull requests that modify pinned versions

  • Treat unexpected updates as potential supply chain attacks

4. Watch for script injection

Be extremely careful when using:

  • ${{ github.event.* }}

  • User-submitted inputs

—> Never directly pass user input into shell commands without sanitization

Example risk:

run: echo "${{ github.event.pull_request.title }}"

This can be exploited if not handled safely.

5. Monitor dependency security

GitHub provides real-time intelligence via:

  • Advisory Database (tracks compromised/vulnerable packages)

  • Dependabot

—> Actions to take:

  • Enable Dependabot alerts

  • Review and apply security updates

  • Pay attention to transitive dependencies

6. Follow GitHub Actions security guidance

GitHub maintains detailed best practices, review them regularly and align your workflows accordingly.

SheHacksPurple Newsletter

SheHacksPurple Newsletter

Learn to Code Securely, with Tanya Janca

Additional Best Practices (Still Important)

These aren’t new, but they remain essential:

Apply least privilege

  • Restrict GITHUB_TOKEN permissions

  • Only grant access that is absolutely necessary

Increase visibility

  • Monitor workflow runs

  • Audit logs regularly

  • Investigate unusual behavior

Protect secrets

  • Avoid exposing secrets to forked repositories

  • Use environment protections and approvals

The Bigger Picture

GitHub’s direction is clear:

—> CI/CD pipelines are now critical infrastructure and must be secured like production systems

The platform is evolving to:

  • Reduce misconfiguration risks

  • Enforce safer defaults

  • Provide better detection and response

But tools alone aren’t enough.

Final Takeaways

If you remember only a few things, make it these:

  • Your GitHub Actions workflows are a primary attack surface

  • Unpinned dependencies = risk

  • User input inside workflows = danger

  • Over-permissioned tokens = easy compromise

And most importantly:

—> Enable CodeQL and follow GitHub’s security guidance today

Quick Security Checklist

  • Enable CodeQL

  • Avoid pull_request_target

  • Pin all actions to commit SHAs

  • Sanitize user inputs in workflows

  • Enable Dependabot alerts

  • Review GitHub Advisory Database

Supply chain attacks are evolving fast but with the right practices, they are highly preventable.

Secure your workflows, and you secure your software.

Smart starts here.

You don't have to read everything — just the right thing. 1440's daily newsletter distills the day's biggest stories from 100+ sources into one quick, 5-minute read. It's the fastest way to stay sharp, sound informed, and actually understand what's happening in the world. Join 4.5 million readers who start their day the smart way.

Reply

Avatar

or to participate

Keep Reading