Skip to content

H3-2025-0018

GitHub Actions Dangerous Bot Conditions

Category SECURITY_MISCONFIGURATION
Base Score 6.0

Description

Workflows that allow bots such as Dependabot to perform privileged actions, often with a "github.actor" check, can be exploited by attackers using malicious commits.

Impact

An attacker can exploit this trust by creating a pull request in which the HEAD commit has github.actor == 'dependabot[bot]' but the rest of the branch history has malicious code, leading to arbitrary code execution.

References