Audit a repository's GitHub Actions workflows for unsafe pull_request_target usage that can lead to supply chain compromise. Use when the user asks to audit workflows, review CI/CD security, check pwn request risk, harden Actions, or after a supply chain incident in a dependency. Also use proactively when reviewing any PR that touches .github/workflows/.
The pull_request_target + PR-head checkout combination is the entire bug class behind the public compromises of TanStack (May 2026), Nx (Aug 2025), PostHog (Nov 2025), Trivy (Feb 2026), tj-actions/changed-files (Mar 2025), and the prt-scan campaign (Mar 2026). Permission flags do not prevent it. SLSA provenance does not prevent it. Cache writes bypass permissions: contents: read entirely.
If a workflow uses pull_request_target AND checks out the PR head, attacker-controlled code runs on a runner that holds the base repo's GITHUB_TOKEN, has access to declared secrets, and can mint OIDC tokens for trusted publishing.
grep -rn "pull_request_target" .github/workflows/. Org-wide: gh search code "pull_request_target" --owner $ORG --extension yml.actions/checkout with ref: ${{ github.event.pull_request.head.sha }} or similar)? CRITICAL.pnpm install, npm test, make build, actions/setup-*, a script committed in the PR)? CRITICAL.lookup-only: true on actions/cache)? HIGH. Cache writes use a runner-internal token and bypass workflow permissions; a poisoned cache is restored by release.yml later.@v1, @main) rather than commit SHA? HIGH.id-token: write? HIGH in combination with any of the above — OIDC tokens are scraped from runner memory, not stolen from secrets.pull_request.For each workflow, produce:
file: .github/workflows/<name>.yml
trigger: pull_request_target
findings:
- <CRITICAL|HIGH|MEDIUM>: <what>
recommendation: <one of below>
pull_request. Default answer. If the workflow doesn't need write access to the base repo or secrets, this closes the entire bug class.pull_request + workflow_run). Untrusted code runs in a pull_request workflow with no secrets and no write permissions, writes its output as an artifact, and a workflow_run workflow triggered on completion reads the artifact and does the privileged work. The trust boundary becomes the artifact handoff — auditable in YAML.pull_request_target (labelling, metadata), do not check out or execute the PR's code at all.actions/cache/restore@v4 only; do not run the save step on fork-triggered builds. Or scope cache keys with attacker-derived prefixes so they cannot collide with release-pipeline keys.tj-actions/changed-files' compromise propagated to thousands of repos because they used @v44.id-token: write must exist, the workflow with it should do nothing except verify pre-built artifacts and publish — no third-party actions, no postinstall scripts, no untrusted paths.minimumReleaseAge). Out of scope.${{ github.event.pull_request.title }} and friends. Related but separate; flag for follow-up.Based on The pull_request_target Trap — full attack anatomy of the May 2026 TanStack incident and the year of prior cases.