Open-source software used by more than 23,000 organizations, some of them in large enterprises, was compromised with credential-stealing code after attackers gained unauthorized access to a maintainer account, in the latest open-source supply-chain attack to roil the Internet.

https://arstechnica.com/information-technology/2025/03/supply-chain-attack-exposing-credentials-affects-23k-users-of-tj-actions/

Large enterprises scramble after supply-chain attack spills their secrets

tj-actions/changed-files corrupted to run credential-stealing memory scraper.

Ars Technica
The plot in this tj-actions supply-chain attack thickens. Another widely used Github Actions, reviewdog/action-setup, was also tampered with, using similar but not identical methodology. From @wiz
GitHub Action supply chain attack: reviewdog/action-setup | Wiz Blog

A supply chain attack on tj-actions/changed-files leaked secrets. Wiz Research found another attack on reviewdog/actions-setup, possibly causing the compromise.

wiz.io

@dangoodin GitHub made the learning curve for Actions so high that everybody uses the libraries.

I find it so much easier to write my own job code in GitLab. Of course, similar attacks could come via DockerHub there.

@dangoodin as if running a container for each step in your CI would be a bad idea.
@dangoodin Users aren't "failing to follow best practices"; GitHub's own examples and guidance for using Actions tells users to use a tag, not a commit hash. Using a hash is definitely safer and I wouldn't be surprised if GitHub quietly changed their guidance, but it's certainly not a best practice that has been widely given to users.
@dangoodin maybe if megacorps stop being parasitic leeches and bother to contribute real money and dev time to projects and their staff, these problems wouldn't be so bad...