Asi Greenholts Profile
Asi Greenholts

@TupleType

Followers
184
Following
453
Media
5
Statuses
43

Concentrated AppSec juice • Security Researcher @PaloAltoNtwks

Joined September 2021
Don't wanna be here? Send us removal request.
@TupleType
Asi Greenholts
8 months
🚨 We know the real target behind the attack on tj-actions/changed-files! Coinbase! The first publicly known exploitation of the technique I presented at DEFCON 31: The GitHub Action Worm. Read the full story: https://t.co/IP6gdeoel5 By @omer_gil @yaronavital @_0xffd and I
Tweet card summary image
unit42.paloaltonetworks.com
A compromise of the GitHub action tj-actions/changed-files highlights how attackers could exploit vulnerabilities in third-party actions to compromise supply chains. A compromise of the GitHub action...
0
0
2
@omer_gil
Omer Gil
1 year
New research our team released today, showing how we could push code to highly popular open source projects maintained by Google, AWS, Microsoft, & Red Hat, through a race condition in GitHub Actions. Go hunt critical #bugbounty issues ;) by @yaronavital https://t.co/ATvTfexwdv
2
3
22
@_0xffd
Aviad
1 year
This Saturday I will be speaking at #DefCon32 about OIDC misconfigurations and abuses in the context of CI/CD 🥴👹. Come check it out! https://t.co/moaaqw1rDU @PaloAltoNtwks #OIDC #oauth2 #ci #cd
3
4
21
@omer_gil
Omer Gil
1 year
Two great talks delivered in Vegas this year by our team - again! In this year’s hacker summer camp in LV, our Research team will stand on the @defcon & @BSidesLV stages again, to share two novel research projects we’ve been working on recently: #HackerSummerCamp #defcon32
1
1
4
@TupleType
Asi Greenholts
1 year
Thank you @HoffmanYaniv for inviting me to discuss about CI/CD security and my "Awesome CI/CD Attacks" project. We explored challenges, solutions, and key insights in this critical area of cybersecurity. https://t.co/p3OK2Vs0K0
1
0
4
@BsidesTLV
BSIDES TLV
1 year
Right now on stage @TupleType with “The GitHub Actions Worm: Compromising GitHub repositories through the actions dependency tree”! Join live: https://t.co/Nu9BLR02r6
0
2
10
@clintgibler
Clint Gibler
1 year
📚 tl;dr sec 234 🗡️ Awesome CI/CD Attacks @TupleType 🤖 STRIDE GPT ☁️ Non Production AWS Attack Surface @Frichette_n 🛡️ Secure defaults @ramimacisabird 🛠️ WAF bypass tool @infosec_au 💻 Hacking millions of routers @samwcyo https://t.co/pg2TR8tNLK
Tweet card summary image
tldrsec.com
Practical resources for offensive CI/CD research, AI threat modeling tool, bypassing CloudTrail through non-prod endpoints
1
9
18
@TupleType
Asi Greenholts
1 year
I'll be speaking at @BsidesTLV !!! Join my session about a novel supply chain attack technique abusing @github Actions intended behavior to spread a worm 🪱. https://t.co/JC9edpaa32
1
0
6
@TupleType
Asi Greenholts
1 year
What do you think is an important routine for a Security Researcher? I think it is reading Cyber news daily. Here are the most unique and high quality resources I've found about CI/CD attacks in the past 3 years: https://t.co/xrE6hN1lBd Thanks @omer_gil for the review!
Tweet card summary image
github.com
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021. - TupleType/awesome-cicd-attacks
1
7
13
@omer_gil
Omer Gil
2 years
Use CVE-2024-27198 to freely access internal TeamCity instances, create admin access tokens, and steal secrets and configurations - even if the server is not exposed to the internet. How? 🧵 #1/10
1
32
123
@PnL63962200
PnL
2 years
Hi @BlackHatEvents - I was shocked to discover that one of your Cyber Security Trainer and Review Board Members is also an antisemitic, a terror supporter who publicly denies Hamas Terror acts. Please remove @Voulnet from his role immediately!
142
250
1K
@TupleType
Asi Greenholts
2 years
How a worm 🪱 can be used to compromise @github repositories at scale through the Actions dependency tree🌲? The blog details a public disclosure out of many reported to #bugbounty programs This was first reveled at @defcon 31 and @BSidesLV https://t.co/MKEaetYtSr
Tweet card summary image
paloaltonetworks.com
GitHub Actions worm compromises GitHub repositories via action dependencies in a novel attack vector allowing attackers to distribute malware across repositories, research shows.
3
8
14
@TupleType
Asi Greenholts
2 years
The GitHub Actions Worm: Compromising GtHub repositories through the actions dependency tree! 🕜 Sat 1:30 pm PT, Track 3 at @defcon 📺 Watch live here: https://t.co/fj1Amkf08f
Tweet card summary image
twitch.tv
DCTV Channel 3 - Streaming DEFCON Track 3 talks to you from DEFCON 33.
0
0
5
@omer_gil
Omer Gil
2 years
Highly inspired by our @owasp Top 10 CI/CD Security Risks project, cool:)
@NSAGov
NSA/CSS
2 years
Keep malicious actors out of your pipeline! Follow the NSA and CISA recommended guidance to defend against CI/CD pipeline compromise. https://t.co/uTA4mP9u0v
1
4
20
@TupleType
Asi Greenholts
2 years
My submission got accepted to @BSidesLV!! Join me at the underground track 🤫 where I'll talk about: The GitHub Actions Worm: Compromising GitHub repositories through the action dependency tree 🌳
1
0
13
@TupleType
Asi Greenholts
2 years
My @defcon submission is accepted! Come see my talk 😄 The GitHub Actions Worm: Compromising GitHub repositories through the action dependency tree #defcon31
3
15
122
@TupleType
Asi Greenholts
3 years
If you're going to @RSAConference this year and you want to see a new attack method, come see @omer_gil and myself talk about: Abuse of Repository Webhooks to Access Hundreds of Internal CI systems. https://t.co/Kpu27BehGX
rsaconference.com
0
1
8
@TupleType
Asi Greenholts
3 years
Check out my new blog "How to secure your Open Source Project – A quick guide for developers" with examples for @github 🥳 https://t.co/m1N66CmZkM
1
3
6
@TupleType
Asi Greenholts
3 years
🔥 The CI/CD Goat 🐐 just got wilder 🔥 Beat our new challenge and win a Gaming Keyboard!!! Thanks to @yaronavital and @omer_gil for co-writing the challenge!
0
1
7