Skip to content

Remove pr-add-reviewers.yml (auto-add of compromised cx-plugins-releases account) (AST-154939, CISO-1134)#1492

Merged
cx-noam-brendel merged 1 commit intoCheckmarx:mainfrom
cx-noam-brendel:remove-compromised-reviewer-cx-plugins-releases
May 10, 2026
Merged

Remove pr-add-reviewers.yml (auto-add of compromised cx-plugins-releases account) (AST-154939, CISO-1134)#1492
cx-noam-brendel merged 1 commit intoCheckmarx:mainfrom
cx-noam-brendel:remove-compromised-reviewer-cx-plugins-releases

Conversation

@cx-noam-brendel
Copy link
Copy Markdown
Collaborator

Why

The workflow's only step hard-codes cx-plugins-releases as a PR reviewer:

run: gh pr edit $PRNUM --add-reviewer cx-plugins-releases

The cx-plugins-releases account ("AST Sypher", astsypher@checkmarx.com) appears to be compromised by the Mini Shai-Hulud supply-chain worm:

  • On 2026-05-09 it created 11 public Dune-themed repos under github.com/cx-plugins-releases/* (fedaykin-laza-800, fremen-navigator-45, mentat-navigator-388, …), each described "A Mini Shai-Hulud has Appeared" and containing a results/ directory with exfiltrated data dumps (one repo holds ~52 MB of split JSON).
  • The same day, a rogue version 2026.5.09 of checkmarx-ast-scanner was uploaded to repo.jenkins-ci.org/releases/... outside the plugin's release pipeline (no git tag, no release, no workflow run produced it).
  • ~1,930 victim repos org-wide on GitHub match the same campaign.

Auto-adding this account as reviewer across Checkmarx PRs embeds a now-untrusted principal into our PR flow. Removing the static reference until Security/IR completes credential rotation and a clean replacement reviewer is decided.

What this PR does

Deletes .github/workflows/pr-add-reviewers.yml outright. The workflow had no other purpose; once the compromised user is removed, the file becomes a no-op. Easier to re-introduce a clean version later than to leave dead code.

Related

cc @AlexMarviCx (please tag the right Security/IR contacts)

The workflow's only step hard-coded `cx-plugins-releases` as a PR
reviewer. That account ("AST Sypher", astsypher@checkmarx.com) appears
compromised by the Mini Shai-Hulud supply-chain worm: on 2026-05-09 it
created 11 public Dune-themed repos containing exfiltrated secrets in
results/ directories (one ~52 MB), and the same day a rogue version
2026.5.09 of the checkmarx-ast-scanner Jenkins plugin was published
outside the release pipeline.

Removing the static reference until Security/IR completes the rotation
and a clean replacement reviewer is decided.
@cx-eli-shalnev cx-eli-shalnev disabled auto-merge May 10, 2026 09:22
@cx-noam-brendel cx-noam-brendel enabled auto-merge (squash) May 10, 2026 09:23
@cx-noam-brendel cx-noam-brendel changed the title Remove pr-add-reviewers.yml (auto-add of compromised cx-plugins-releases account) Remove pr-add-reviewers.yml (auto-add of compromised cx-plugins-releases account) (CISO-1134) May 10, 2026
@cx-noam-brendel
Copy link
Copy Markdown
Collaborator Author

@Checkmarx/sg-app-github-owners-local — please review and bypass-merge.

Context: active Mini Shai-Hulud supply-chain worm response. Tracked under CISO-1134 (parent epic CISO-815). The cx-plugins-releases ("AST Sypher", astsypher@checkmarx.com) GitHub account that this workflow auto-adds as reviewer appears compromised:

  • 11 public Dune-themed exfil repos created on its account on 2026-05-09 (one ~52 MB), each described "A Mini Shai-Hulud has Appeared".
  • Same day, a rogue version 2026.5.09 of checkmarx-ast-scanner was uploaded to repo.jenkins-ci.org outside the release pipeline — already yanked via jenkins-infra/update-center2#914 (merged) and warning entry pending in #916.

This PR removes the static reference. While it's open, every PR opened in this repo continues to auto-assign the compromised account as reviewer. Forensic write-up: ~/Downloads/forensic-report-checkmarx-ast-scanner-2026.5.09.md (Noam Brendel).

The Checkmarx One Scan and lint failures are policy/secrets-related (fork PR can't run the Checkmarx scan; lint requires Jira ID — now (CISO-1134) is in the title). Please bypass-merge under the org ruleset.

@cx-noam-brendel cx-noam-brendel changed the title Remove pr-add-reviewers.yml (auto-add of compromised cx-plugins-releases account) (CISO-1134) Remove pr-add-reviewers.yml (auto-add of compromised cx-plugins-releases account) (AST-154939, CISO-1134) May 10, 2026
@cx-noam-brendel
Copy link
Copy Markdown
Collaborator Author

Update for the bypass team — title now contains the required (AST-154939) plus (CISO-1134) for the parent CISO incident ticket.

The three failing required checks (Checkmarx One Scan, integration-tests, scan Docker Image with Trivy) are fork-PR secret failures, not real test failures. Excerpt from the integration-tests log:

err: assertion failed: error is not nil:
     Error validating scan types: Failed to authenticate - please provide an access key ID

GitHub does not pass repository secrets to workflows triggered by pull_request from a fork (standard supply-chain protection). This PR is from cx-noam-brendel/ast-cli-fork, so the runs spawn but die at the auth step. The change itself is one deletion: .github/workflows/pr-add-reviewers.yml.

Please admin-merge despite the failing checks. The bleeding (auto-adding the compromised cx-plugins-releases account to every new PR) keeps happening until this lands.

@cx-noam-brendel cx-noam-brendel merged commit 2899d9e into Checkmarx:main May 10, 2026
6 of 12 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants