Upgrade to Pro — share decks privately, control downloads, hide ads and more …

And I Would've Gotten Away With It, Too, If It ...

Sponsored · Ship Features Fearlessly Turn features on and off without deploys. Used by thousands of Ruby developers.
Avatar for Rami McCarthy Rami McCarthy
September 16, 2025

And I Would've Gotten Away With It, Too, If It Wasn't For You Meddling Researchers

Some research is a slow burn; but mine is often a frantic scramble to keep up with threat actors or CloudSec Twitter. This talk uses the tj-actions/changed-files incident to expose the raw reality of rapid response research in cloud security. Using the incident as our backdrop, I'll walk you through the nitty-gritty of how a leading cloud security research team investigates urgent supply chain attacks. You'll get actionable takeaways on leveraging external data (okay … Twitter and Hacker News), the critical role of community, and the behind the scenes collaboration involved in publishing authoritative analysis. Expect a few frantic Slack screenshots and a stark look at how the research sausage is made.

Avatar for Rami McCarthy

Rami McCarthy

September 16, 2025

More Decks by Rami McCarthy

Other Decks in Technology

Transcript

  1. And I Would've Gotten Away With It, Too If It

    Wasn’t For You Meddling Researchers
  2. But still - here’s a quick summary of tj-actions •

    November, 2024: a malicious pull request exploits a poisoned-pipeline execution flaw in spotbugs/sonar-findbugs to steal a PAT • December, 2024: that PAT allows the attacker to pivot to spotbugs/spotbugs and compromise an additional PAT • March 11, 2025: the compromise PAT is used to point reviewdog/action-setup@v1 temporarily to a malicious fork commit. tj-actions uses that action, leaking their PAT • March 14, 2025: the tj-actions PAT is used to first target Coinbase, then broadly poison tj-actions/changed-files
  3. 👋 Hi, I’m Rami • Cloud Risk Research Lead at

    Wiz • Previously: security things at Figma, Cedar, and NCC Group https://ramimac.me
  4. Responding to emergent security news • Research & Analysis •

    Threat & Incident Response • Product & Development (by Monday morning)
  5. Digression: GitHub firehose • GHArchive: a project to record the

    public GitHub timeline, archive it, and make it easily accessible for further analysis • Available on BigQuery and Clickhouse
  6. Lessons for Rapid Response Research 1. Security is a team

    sport: collaborate, share breadcrumbs, and pay attention to the ecosystem 2. Disclose responsibly, support open source maintainers 3. Seek alternative data sources, and archive your data 4. An excalidraw is worth a thousand words 5. Keep it fun! https://speakerdeck.com/ramimac