Expected Findings
- Workflow file exposes privileged release secrets and unsafe trust assumptions.
- Action tags were force-moved to malicious commits.
- Audit log shows compromised automation credentials being reused.
This page simulates a compromised CI/action chain where workflow secrets, action tags, and release metadata were tampered with after automation credentials were exposed.
TRIVY_GITHUB_TOKEN: ${{ secrets.RELEASE_PAT }}
v0.69.4 -> 1f2e3d4 malicious commit