Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Malicious Commands in GitHub Codespaces Enable RCE
News

Malicious Commands in GitHub Codespaces Enable RCE

Team-CWDBy Team-CWDFebruary 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A set of attack vectors in GitHub Codespaces have been uncovered that enable remote code execution (RCE) by opening a malicious repository or pull request.

The findings by Orca Security, show how default behaviours in the cloud-based development service can be abused to execute code, steal credentials and access sensitive resources without explicit user approval.

GitHub Codespaces provides developers with a cloud-hosted Visual Studio Code (VSC) environment that spins up in minutes. It automatically applies repository-defined configuration files to streamline development and collaboration. That convenience, however, also creates an attack surface when those files are controlled by an adversary.

How the Exploitation Works

The research outlines how Codespaces automatically respects several configuration files on startup or when a pull request is checked out.

By embedding malicious commands in these files, attackers can trigger execution as soon as the environment loads. The issue affects both newly created Codespaces and existing ones that switch branches or pull requests.

Read more on GitHub security: GhostAction Supply Chain Attack Compromises 3000+ Secrets

The Orca Security researchers identified three primary vectors that can be abused without additional user interaction:

  • Automatic tasks triggered on folder open via .vscode/tasks.json
  • Terminal environment manipulation through .vscode/settings.json
  • Dev container lifecycle hooks defined in .devcontainer/devcontainer.json

Each vector allows arbitrary command execution, enabling exfiltration of environment variables, including GitHub authentication tokens and Codespaces secrets.

Potential Impact

Once obtained, a GitHub token can be used to read and write to repositories in the context of the victim user. In the case of a malicious pull request against a public project, this could allow an attacker to impersonate a trusted maintainer and introduce backdoored code.

The researchers also demonstrated how these techniques could be chained to move laterally within GitHub Enterprise environments and access hidden organisational data.

The study further showed that stolen tokens could be used with undocumented GitHub APIs to access premium Microsoft Copilot models on behalf of compromised users. This raises the risk of exposing sensitive internal information if enterprise knowledge bases are queried by an attacker.

Microsoft confirmed the behaviour and stated that it is by design, relying on trusted-repository controls and existing settings to limit abuse.

However, Orca Security argued that the findings highlight a broader issue: “while Microsoft considers this behavior by design, relying on trusted-repository and settings-sync controls to limit cross-environment impact, development environments must treat repository-supplied configurations with zero trust, as they remain a viable vector within the originating environment.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks
Next Article SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

What it is and how to protect yourself

January 8, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.