
I Audit AWS Accounts. 8 Out of 10 Have This GitHub Actions Backdoor.
TL;DR: Configuring GitHub Actions OIDC is very convenient and useful, but often dangerous. If you didn't consider one specific IAM requirement and created a role before June 2025, you're almost certainly vulnerable to an attack that would allow ANY GitHub repository to assume your AWS deployment role. The title sounds scary and clickbait, right? Unfortunately, only the second part of the question is false. It's not clickbait. Last week, Google published details about a threat group called UNC6426. A single compromised npm package allowed access to full AWS admin within 72 hours. How was this possible? Well, a poisoned npm package stole the developer's GitHub token. From there, the path was clear - going directly to production on AWS, password-free and alert-free. The door they used? It's probably open in your account right now. How a single npm install led to AWS admin Let's take a look at the attack process and try to understand it in simple terms. One developer came to work on Monday
Continue reading on Dev.to DevOps
Opens in a new tab


