hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions
This blog post from StepSecurity details a week-long automated attack campaign in February and March 2026 where an autonomous AI bot called hackerbot-claw systematically exploited GitHub Actions workflows across major open source repositories, including those belonging to Microsoft, DataDog, CNCF, and popular projects like Trivy and awesome-go. The bot used five different exploitation techniques including poisoned Go scripts via pull_request_target workflows, direct script injection, branch name injection, filename injection with base64 encoded commands, and AI prompt injection targeting Claude Code reviewers through poisoned configuration files. In the most severe incident, the attacker stole a personal access token from the aquasecurity/trivy repository and achieved full repository takeover, making the repository private, deleting years of releases, and pushing a malicious artifact to the Open VSX marketplace. The campaign successfully compromised at least five of seven targeted repositories, with only Claude’s built-in prompt injection detection stopping the AI-targeted attack. The post emphasizes that autonomous attacks require automated defenses and recommends implementing network egress monitoring, minimum token permissions, static workflow analysis, and developer MDM solutions to prevent similar compromises.
https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation
Comments
Post a Comment