Wednesday, March 18, 2026

Top 5 This Week

Related News

JFrog discovers 13 vulnerabilities in GitHub repositories using “RepoHunter” AI-research security bot

JFrog Ltd., the Liquid Software company and creators of the JFrog Software Supply Chain Platform, today announced its Security Research team was the first to detect, report, and help remediate 13 vulnerabilities, 10 of which are critical, in CI/CD workflows within well-known GitHub repositories. These were discovered using JFrog’s internal research tool, RepoHunter, an AI-research security research bot built to detect CI/CD workflow vulnerabilities.

The vulnerabilities discovered by the JFrog Security Research Team, by detecting vulnerable workflow patterns, are commonly referred to as “Pwn Requests”. The vulnerabilities were found in repositories such as Ansible, automation software trusted by millions of enterprise users, including Fortune 500 companies, and QGIS, a mapping and data visualization tool often used by government organizations.

This type of vulnerability directly threatens infrastructure powering global financial systems, JavaScript standards, and critical AI infrastructure used by large enterprises and governments globally. This proactive discovery comes in the wake of the Shai-Hulud worm and the “S1ngularity” attack, both of which exploited similar CI/CD pipeline flaws to poison software supply chains and exfiltrate secrets.

“This discovery is a wake-up call for the industry as it raises two critical concerns. First, CI/CD pipelines are now major risk points as attackers exploit open-source vulnerabilities, as demonstrated by the 13 identified “Pwn Request” flaws, indicating a shift from direct package maintainer attacks to pipeline hijacking,” said Shachar Menashe, Vice President of Security Research, JFrog. “Second, it proves the industry’s reliance on trust-based automation is being exploited at scale. Our AI-research bot, RepoHunter, proves that when misused, AI technologies can severely damage global software supply chains. Attacks that once took months for bad actors to orchestrate can now be executed in days. This underscores the importance of equipping trustworthy parties with these tools to counter potential threats quickly.”

Packages & Workflows Under Attack

In modern software development, CI/CD pipelines have become the backbone of efficient, rapid software delivery. These automated systems streamline the journey from code commit to production, enabling organizations to ship features faster than ever. However, this has also made CI/CD pipelines one of the most attractive targets for sophisticated attackers, offering a direct path to the “keys to the kingdom.” Thus, the potential “blast radius” of these discoveries, if they were exploited, is vast.

What JFrog’s RepoHunter

Prevented By opening malicious pull requests that exploit unsanitized metadata or code, the vulnerabilities provide a direct pathway to exfiltrate critical secrets, including cloud credentials, signing keys, and deployment tokens. These secrets can be used directly to poison these same projects with malicious code and perform a software supply chain attack at scale.

The 13 new vulnerabilities discovered by JFrog’s RepoHunter impact important industry frameworks and use cases such as:

●Software Developer Supply Chain Workflows at Scale: The discovered flaws in Ansible could have enabled the hijacking of 29 packages, collectively driving millions of monthly downloads, potentially poisoning development environments for all downstream users.

●AI-Powered Mobile Payment Systems: Vulnerabilities were found in Xorbitsai and Tencent/ncnn – the AI frameworks powering WeChat Pay’s 1.4 billion users.

●Programming Language Toolchains: A critical vulnerability in a tc39 proposal repository, which could lead to compromising risks to trust in the JavaScript standardization process itself, creating an ecosystem-wide downstream risk, as well as vulnerabilities in p4lang, typst.

●Global Governing Standards & Security Infrastructure: JFrog also uncovered and fixed vulnerabilities found in, Eclipse Theia, Petgraph rust libraries and sdkman (developer tools), QGIS (geospatial mapping), telepresence (CNCF open source tool), and more. These could have weakened companies’ software security, caused performance issues, data loss, etc. which would have negatively impacted user trust and compliance requirements. Protecting these frameworks is vital to ensure the integrity and reliability of services that directly affect end users in their daily lives.

Recently, 7 more repositories belonging to Microsoft, DataDog, the CNCF, and popular open-source projects such as Trivy, were hit by AI-assisted techniques similar to RepoHunter, proving its efficacy and underscoring the importance of putting powerful AI technologies in the hands of “white hat hackers”.

These research techniques and findings have been embedded in the JFrog Platform to help customers detect vulnerable workflows that could cause open-source repository takeovers. JFrog worked closely with project maintainers to remediate these issues responsibly before disclosure. For a full technical breakdown of the vulnerabilities, discovery and remediation strategies, read this blog.

Also read: Viksit Workforce for a Viksit Bharat

Do Follow: The Mainstream LinkedIn | The Mainstream Facebook | The Mainstream Youtube | The Mainstream Twitter

About us:

The Mainstream is a premier platform delivering the latest updates and informed perspectives across the technology business and cyber landscape. Built on research-driven, thought leadership and original intellectual property, The Mainstream also curates summits & conferences that convene decision makers to explore how technology reshapes industries and leadership. With a growing presence in India and globally across the Middle East, Africa, ASEAN, the USA, the UK and Australia, The Mainstream carries a vision to bring the latest happenings and insights to 8.2 billion people and to place technology at the centre of conversation for leaders navigating the future.

Popular Articles