- Description: An attacker crafts a malicious GitHub Action and publishes it. A developer includes this action in their workflow. When
act
runs the workflow, it downloads and executes the malicious action within a Docker container. The attacker's code could attempt to escape the container, steal secrets, or modify the host system. This is direct becauseact
is the component downloading and running the untrusted code.- Impact: Host system compromise, data exfiltration, lateral movement, potential CI/CD pipeline compromise.
act
Component Affected:act
's action runner (downloading/executing actions), Docker container management.- Risk Severity: Critical
- Mitigation Strategies:
- Pin Actions to Specific Commits (e.g.,
uses: owner/repo@sha256hash
). - Vendor Actions (copy source code into your repository).
- Thoroughly Review Action Source Code.
- Use a Private Actions Registry.
- Limit Permissions (rootless Docker, least privilege).
- Pin Actions to Specific Commits (e.g.,
- Description: A developer uses
act
to run a workflow requiring secrets. The workflow, as executed byact
, is misconfigured and prints the secret or exposes it in environment variables accessible within the container. An attacker with access to theact
execution environment (e.g., compromised host, access toact
's output) retrieves the secret. This is direct becauseact
is the execution environment where the exposure occurs.- Impact: Compromise of credentials, unauthorized access, data breaches.
act
Component Affected:act
's environment variable handling, workflow execution, logging (ifact
logs are insecure).- Risk Severity: Critical
- Mitigation Strategies:
- Use
act
's Secret Management (-s
or--secret-file
). - Never Print Secrets in workflows.
- Integrate with a Secrets Manager.
- Secure Workflow Logs (if generated by
act
). - Mask Secrets in Logs (if unavoidable).
- Use
- Description: A developer uses
act
with--bind
or a workflow with avolume
mount that exposes sensitive host filesystem parts to the Docker container as configured throughact
. A malicious action or compromised container reads/modifies files on the host. This is direct becauseact
is responsible for setting up the bind mount.- Impact: Data leakage, file system corruption, privilege escalation.
act
Component Affected:act
's Docker container management (bind mount/volume handling).- Risk Severity: High
- Mitigation Strategies:
- Minimize/Avoid
--bind
. - Restrict Mount Points to only necessary files/directories.
- Use Read-Only Mounts (
:ro
). - Run
act
as Non-Root. - Use Rootless Docker.
- Minimize/Avoid
- Description: A workflow specifies a Docker image. An attacker compromises the registry or uses a MITM attack to redirect the image pull to a malicious image.
act
, during its execution, pulls and runs the attacker's image. This is direct becauseact
is performing the image pull.- Impact: Arbitrary code execution, host compromise, data exfiltration.
act
Component Affected:act
's Docker image pulling mechanism.- Risk Severity: High
- Mitigation Strategies:
- Use Specific Image Digests (not tags).
- Use a Private Registry.
- Enable Docker Content Trust.
- Network Segmentation (isolate
act
's network).