
Product
Introducing Socket Fix for Safe, Automated Dependency Upgrades
Automatically fix and test dependency updates with socket fix—a new CLI tool that turns CVE alerts into safe, automated upgrades.
Security News
Sarah Gooding
March 17, 2025
A widely-used GitHub Action, tj-actions/changed-files
, was compromised in a supply chain attack over the weekend. It was first spotted by StepSecurity after they detected an unexpected endpoint in network traffic. On March 14–15, 2025, a threat actor gained access to the action’s repository, likely via a stolen credential, and modified version tags (v1 through v45.0.7) to point to a malicious commit. This commit injected code into workflows using the action, causing sensitive secrets from CI/CD runs to be printed into the workflow logs. The issue has been assigned CVE-2025-30066. The maintainers have since reverted the malicious changes, but not before many projects were affected.
The impact of this attack is significant. Over 23,000 repositories actively use tj-actions/changed-files
, with around a million monthly downloads. Any workflow that pulled the malicious version would expose its secrets—including API keys, authentication tokens, and passwords—within CI/CD logs. For public repositories, this effectively made secrets accessible to anyone viewing the logs. Even for private repositories, organizations should assume their secrets were compromised since the attacker’s code had access to them.
As a result, developers and companies must now rotate potentially compromised credentials and audit their workflows to ensure they are no longer using affected versions. The incident demonstrates how even simple and trusted actions can become attack vectors, causing widespread consequences for downstream users.
If your organization used tj-actions/changed-files
, immediate action is necessary:
To prevent similar supply chain attacks, developers should adopt the following best practices:
This incident highlights a concerning trend: attackers are increasingly targeting GitHub Actions and CI/CD workflows as an entry point for supply chain attacks. By compromising a popular GitHub Action, an attacker can instantly affect thousands of downstream projects. Similar incidents in the past have included compromised workflows leaking publishing tokens, allowing attackers to push malicious software updates, as recently seen in the Ultralytics supply chain attack.
As more organizations rely on GitHub Actions for automation, securing CI/CD infrastructure is as critical as securing application code. When including a third-party GitHub Action, developers are effectively executing someone else’s code in their environment. Organizations must treat their build systems as production environments—locking down dependencies, monitoring for anomalies, and enforcing stricter access controls to continue leveraging automation safely.
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now
Product
Automatically fix and test dependency updates with socket fix—a new CLI tool that turns CVE alerts into safe, automated upgrades.
Security News
CISA denies CVE funding issues amid backlash over a new CVE foundation formed by board members, raising concerns about transparency and program governance.
Product
We’re excited to announce a powerful new capability in Socket: historical data and enhanced analytics.