BeEF Project Compromise
A single pull request can expose secrets and compromise your pipeline. See how a real CI/CD attack unfolded—and how to stop it before it happens.
Research
BeEF Project Compromise
A Silent Supply Chain Compromise—One Pull Request Away
A single workflow change in the BeEF open-source project introduced a critical vulnerability that allows any GitHub user to execute arbitrary code and steal sensitive secrets, without approval.This proven attack path was found hiding in plain sight across modern CI/CD pipelines.
Why This Report Matters
Small CI/CD changes can have major consequences
What looks like a routine workflow update can create a direct path to code execution, secret theft, and repository compromise.
The risk is real and easy to overlook
This report examines a validated attack path that required no maintainer approval and only minimal attacker effort.
The lessons apply far beyond one project
This report analyzes a proven attack path rooted in a known CI/CD misconfiguration.
Key Insights
This attack didn’t require sophisticated tooling—just a pull request.
- A “pwn request” vulnerability enabled arbitrary code execution in the CI pipeline
- No privileges required—any GitHub user could trigger the exploit
- Secrets, including GitHub tokens and third-party credentials, were immediately exposed
- The compromised token enabled direct code changes, workflow manipulation, and release tampering
What You'll Learn
Understand how a routine workflow becomes a supply chain attack—and how to stop it.
- How pull_request_target turns CI pipelines into attack surfaces
- The exact mechanics of a “pwn request” exploit
- How attackers move from untrusted code to trusted execution
- What secrets are exposed—and how they’re weaponized
- The fastest path to containment, hardening, and prevention
You might also like
Learn how we helped the customers to reach the next level
Podcast
NetRise’s Tom Pace on why telecom’s Salt Typhoon problem may never go away
Webinar
Dissecting Salt Typhoon: Inside the Campaign That Redefined Telecom Cyber Risk
Podcast
Thomas Pace Talks CISA, Cyber Threats & Supply Chain