Remove pr-add-reviewers.yml (auto-add of compromised cx-plugins-releases account) (AST-154939, CISO-1134)#1492
Conversation
The workflow's only step hard-coded `cx-plugins-releases` as a PR
reviewer. That account ("AST Sypher", astsypher@checkmarx.com) appears
compromised by the Mini Shai-Hulud supply-chain worm: on 2026-05-09 it
created 11 public Dune-themed repos containing exfiltrated secrets in
results/ directories (one ~52 MB), and the same day a rogue version
2026.5.09 of the checkmarx-ast-scanner Jenkins plugin was published
outside the release pipeline.
Removing the static reference until Security/IR completes the rotation
and a clean replacement reviewer is decided.
|
@Checkmarx/sg-app-github-owners-local — please review and bypass-merge. Context: active Mini Shai-Hulud supply-chain worm response. Tracked under CISO-1134 (parent epic CISO-815). The
This PR removes the static reference. While it's open, every PR opened in this repo continues to auto-assign the compromised account as reviewer. Forensic write-up: The Checkmarx One Scan and lint failures are policy/secrets-related (fork PR can't run the Checkmarx scan; lint requires Jira ID — now |
|
Update for the bypass team — title now contains the required The three failing required checks ( GitHub does not pass repository secrets to workflows triggered by pull_request from a fork (standard supply-chain protection). This PR is from Please admin-merge despite the failing checks. The bleeding (auto-adding the compromised |
Why
The workflow's only step hard-codes
cx-plugins-releasesas a PR reviewer:The
cx-plugins-releasesaccount ("AST Sypher",astsypher@checkmarx.com) appears to be compromised by the Mini Shai-Hulud supply-chain worm:2026-05-09it created 11 public Dune-themed repos undergithub.com/cx-plugins-releases/*(fedaykin-laza-800,fremen-navigator-45,mentat-navigator-388, …), each described"A Mini Shai-Hulud has Appeared"and containing aresults/directory with exfiltrated data dumps (one repo holds ~52 MB of split JSON).2026.5.09ofcheckmarx-ast-scannerwas uploaded torepo.jenkins-ci.org/releases/...outside the plugin's release pipeline (no git tag, no release, no workflow run produced it).Auto-adding this account as reviewer across Checkmarx PRs embeds a now-untrusted principal into our PR flow. Removing the static reference until Security/IR completes credential rotation and a clean replacement reviewer is decided.
What this PR does
Deletes
.github/workflows/pr-add-reviewers.ymloutright. The workflow had no other purpose; once the compromised user is removed, the file becomes a no-op. Easier to re-introduce a clean version later than to leave dead code.Related
~/Downloads/forensic-report-checkmarx-ast-scanner-2026.5.09.md(Noam Brendel)Checkmarx/ast-azure-plugin/.github/workflows/pr-automation.yml— should be removed in a separate PR.cc @AlexMarviCx (please tag the right Security/IR contacts)