Prompt injection within GitHub Actions: Google Gemini and multiple other fortunate 500 companies vulnerable

So this is pretty crazy. Back in August we reported to Google a new class of vulnerability which is using prompt injection on GitHub Action workflows.

Because all good vulnerabilities have a cute name we are calling it PromptPwnd

This occus when you are using GitHub Actions and GitLab pipelines that integrate AI agents like Gemini CLI, Claude Code Actions, OpenAI Codex Actions, and GitHub AI Inference.

What we found (high level):

The underlying pattern:
Untrusted user input → injected into AI prompt → AI executes privileged tools → secrets leaked or workflows modified

Example of a vulnerable workflow snippet:

prompt: | Review the issue: "${{ github.event.issue.body }}" 

How to check if you're affected:

Recommended mitigations:

If you’re experimenting with AI in CI/CD, this is a new attack surface worth auditing.
Link to full research: https://www.aikido.dev/blog/promptpwnd-github-actions-ai-agents

submitted by /u/Advocatemack
[link] [comments]