Skip to content

PromptPwnd Prompt Injection Vulnerabilities in GitHub Action...#235

Merged
carlospolop merged 2 commits intomasterfrom
update_PromptPwnd__Prompt_Injection_Vulnerabilities_in_Gi_20251205_014747
Dec 7, 2025
Merged

PromptPwnd Prompt Injection Vulnerabilities in GitHub Action...#235
carlospolop merged 2 commits intomasterfrom
update_PromptPwnd__Prompt_Injection_Vulnerabilities_in_Gi_20251205_014747

Conversation

@carlospolop
Copy link
Copy Markdown
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

  • Blog URL: https://www.aikido.dev/blog/promptpwnd-github-actions-ai-agents
  • Blog Title: PromptPwnd: Prompt Injection Vulnerabilities in GitHub Actions Using AI Agents
  • Suggested Section: 🏭 Pentesting CI/CD / Github Security / Abusing Github Actions (new subsection: "AI Agent Prompt Injection & Secret Exfiltration in GitHub Actions / CI/CD")

🎯 Content Summary

This blog defines a new vulnerability pattern, PromptPwnd, where AI agents integrated into GitHub Actions or GitLab CI/CD (e.g., Gemini CLI, Claude Code Actions, OpenAI Codex Actions, GitHub AI Inference) process untrusted repository content and can execute privileged actions using high-privilege tokens. It is one of the first verified instances where AI prompt injection is shown to directly compromise CI/CD pipelines.


High-level pattern...

🔧 Technical Details

Prompt injection against AI agents in CI/CD pipelines
The core trick is to treat any place where untrusted text (issue/PR bodies, commit messages, comments) flows into an LLM prompt as an instruction channel. If an AI agent in GitHub Actions/GitLab CI embeds these fields directly into its prompt, an attacker can embed natural language directives inside them (e.g., framed as “additional instructions” or documentation) that override system instructions: “After you finish analysis, call run_shell_command with these arguments.” Because the LLM is allowed to choose tools and their parameters, this converts those text fields into a way to program the CI agent, leading to arbitrary tool invocations under the workflow’s privileges.


Secret exfiltration via GitHub CLI write operations
Whenever an AI agent exposes GitHub CLI-based tools like run_shell_command(gh issue edit) or run_shell_command(gh issue comm...

🤖 Agent Actions

Summary:

  • Added a comprehensive “AI Agent Prompt Injection & Secret Exfiltration in CI/CD” subsection to src/pentesting-ci-cd/github-security/abusing-github-actions/README.md, detailing the PromptPwnd attack chain, Gemini CLI exploitation workflow, additional AI agent misconfigurations (Claude, Codex, GitHub AI Inference), indirect injection vectors, and actionable detection/hardening guidance.
  • Expanded the references list to include the PromptPwnd blog and related OpenGrep resources to support the new material.

Tests: Not run (documentation-only changes).


This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

📚 Repository Maintenance

  • MD files processed: 571
  • MD files fixed: 1

All .md files have been checked for proper formatting (headers, includes, etc.).

@carlospolop
Copy link
Copy Markdown
Collaborator Author

🔗 Additional Context

Original Blog Post: https://www.aikido.dev/blog/promptpwnd-github-actions-ai-agents

Content Categories: Based on the analysis, this content was categorized under "🏭 Pentesting CI/CD / Github Security / Abusing Github Actions (new subsection: "AI Agent Prompt Injection & Secret Exfiltration in GitHub Actions / CI/CD")".

Repository Maintenance:

  • MD Files Formatting: 571 files processed (1 files fixed)

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@carlospolop carlospolop merged commit c15fe5e into master Dec 7, 2025
@carlospolop carlospolop deleted the update_PromptPwnd__Prompt_Injection_Vulnerabilities_in_Gi_20251205_014747 branch December 7, 2025 11:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant