Remove tag prisma-public-cloud
article thumbnail

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree

Prisma Clud

Get an in-depth look at the attack vectors, technical details and a real-world demo in this blog post highlighting our latest research. Reference a tag. Figure 8: Calling an action using a tag We can use the secrets exfiltrated in the flow to infect the repository with malicious code. Reference a commit hash. Reference a branch.

Malware 144
article thumbnail

Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows

Prisma Clud

As we discussed in the previous blog post, Third-Party GitHub Actions: Effects of an Opt-Out Permission Model , the permissive nature of GitHub Actions workflows is prevalent throughout the open-source community and private projects on GitHub. Figure 3: Pyupio/safety’s action.yaml file pulls a mutable image with the ‘latest’ tag.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cloud-Native Abstraction and Automation

Palo Alto Networks

The Key to IT Org Success in the Cloud Great things happen when an IT organization moves to the cloud. Yet, many public sector organizations are apprehensive to move to the cloud, or they have been wondering why their organizations are still struggling in the cloud. We are going to learn something today!

Cloud 48
article thumbnail

CCPA: What You Need to Know for Public Cloud

Palo Alto Networks

When it comes to the impact of CCPA on your cloud business, two key questions need to be evaluated: . How will this impact your public cloud security and compliance program? . You can also create policies using services like AWS Config and Azure Policy that enforce tagging rules and conventions. Data Security.

Cloud 47
article thumbnail

10 Cloud Security Risks Organizations Should Address

Prisma Clud

Through advances in cloud technology, data access is now readily available. With datasets increasingly made available to company employees via cloud adoption or migration, the potential for personal and identifiable data falling into the wrong hands increases. This is a boon for developers.