TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hacking GitHub AWS integrations again

2 pointsby dagrzalmost 2 years ago

1 comment

dagrzalmost 2 years ago
Author here.<p>There&#x27;s been a lot of great work recently on hacking Github-AWS OIDC integrations but I&#x27;ve think we&#x27;ve undersold how bad it is. Here&#x27;s my guide to finding all the vulnerable roles in all public repos, including new commits in real time.<p>For those that aren&#x27;t aware, it&#x27;s devastating for anyone affected. You give an AWS role permission to be assumed by Githuab Actions, only you misconfigure it not to match the repo or org name. The result is a classic confused deputy, where any repo in Github can assume your role.