We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
arduino-esp32 uses a compromised version of tj-actions/changed-files. The compromised action appears to leak secrets the runner has in memory.
The action is included in:
Output of an affected run:
Please review.
Learn about the compromise on StepSecurity of Semgrep.
This issue has been assigned CVE-2025-30066
The text was updated successfully, but these errors were encountered:
Note that https://github.com/espressif/pytest-embedded also uses this action.
Sorry, something went wrong.
@eslerm thanks! we are aware and actions are currently disabled
Fixed by #11130
Successfully merging a pull request may close this issue.
arduino-esp32 uses a compromised version of tj-actions/changed-files. The compromised action appears to leak secrets the runner has in memory.
The action is included in:
Output of an affected run:
Please review.
Learn about the compromise on StepSecurity of Semgrep.
This issue has been assigned CVE-2025-30066
The text was updated successfully, but these errors were encountered: