Hello, I'm

Barak Haryati

Senior Director of Product Security at 🐸 JFrog

"Securing innovation through innovative security."

Security evangelist, vulnerability researcher, and active contributor to the open-source security community. I lead product security initiatives that protect millions of developers and enterprises worldwide — from discovering multiple critical CVEs in major open-source projects to building secure platforms, guardrails, and security tools such as RepoHunter.

Application Security Cloud Security CI/CD & Supply Chain AI Security Vulnerability Research
Barak Haryati

🛠️ Tools

RepoHunter — AI-powered CI/CD security research tool

RepoHunter is an AI-powered security research tool built to identify exploitable CI/CD workflow misconfigurations across open-source repositories. It specializes in detecting dangerous CI/CD patterns in GitHub Actions workflows — including pull_request_target, workflow_run, issue_comment, unsafe artifact consumption, script injection via untrusted context variables, and other risky implementations where untrusted input intersects with elevated permissions, secrets access, or write tokens — enabling Pwn Request (pwn_request) style attacks.

RepoHunter was used to discover and prevent Shai-Hulud 3 (Shai_Hulud) style CI/CD supply chain attacks across widely used open-source projects. Its research focus includes pull_request_target exploitation, workflow_run abuse, repository takeover via GITHUB_TOKEN, secret exfiltration, artifact poisoning, and downstream supply-chain compromise scenarios.

Built by Barak Haryati at JFrog as part of open-source security research, RepoHunter has been used to responsibly disclose critical RCE and supply chain vulnerabilities in projects such as Ceph, Telepresence, Ansible, QGIS, Parse Server, Xorbits Inference, and others.

Capabilities

  • Detection of unsafe pull_request_target, workflow_run, and issue_comment triggers
  • Pwn Request, script injection, and fork-based exploitation analysis
  • GITHUB_TOKEN permission and secret exposure scanning
  • AI-assisted exploitability validation and triage
  • Supply-chain risk and downstream impact assessment
  • Responsible disclosure support for open-source projects
AI Security Research CI/CD Supply Chain GitHub Actions Security Pwn Request pull_request_target Shai-Hulud Open Source Security Repository Takeover Secret Exfiltration

GithubForensicTest is a forensic security tool that scans GitHub Pull Request diffs at scale to detect secrets, credentials, vulnerabilities, and malicious code injections. It is designed for security researchers investigating CI/CD pipeline abuse, pull_request_target exploits, and Pwn Request attack evidence in open-source repositories.

The tool downloads and analyzes PR diffs using powerful regex pattern matching with ripgrep integration for 10-100x faster searching. It supports multi-token rotation for handling GitHub API rate limits, parallel downloads for large repositories, and exports results in JSON and CSV formats for forensic analysis and audit trails.

GithubForensicTest can be used to search for exposed API keys, leaked tokens, hardcoded passwords, eval() and exec() injections, and other suspicious code patterns across thousands of pull requests in any GitHub repository.

Capabilities

  • Regex-based PR diff pattern search at scale
  • Ripgrep integration for 10-100x faster scanning
  • Parallel downloads with multi-token rotation
  • Secret, credential, and API key detection
  • Malicious code injection pattern matching
  • JSON and CSV export with full audit logging
Forensics Secret Detection PR Analysis Vulnerability Research CI/CD Forensics Supply Chain Open Source Python

OpenSSL FIPS Builder automates the setup and compilation process for building an OpenSSL application with FIPS (Federal Information Processing Standards) provider support inside a Docker environment. It compiles the FIPS module, configures OpenSSL to work in FIPS mode, and installs it on a separate Debian container.

Designed for teams that need FIPS-compliant cryptographic operations in containerized environments, the tool supports configurable OpenSSL and FIPS module versions and produces isolated, production-ready containers with validated cryptographic providers.

Capabilities

  • Automated FIPS module compilation and extraction
  • Configurable OpenSSL and FIPS versions
  • Docker-based isolated build environment
  • FIPS-mode OpenSSL configuration
  • Production-ready Debian container output
  • Compliance with federal cryptographic standards
Cryptography FIPS Docker OpenSSL Compliance Shell

OpenSCAP Scanner provides a containerized solution for running OpenSCAP security scans on Red Hat Enterprise Linux 9 (UBI9) containers. It automates the full workflow — building the Docker image, running the scan with the STIG profile, and exporting human-readable HTML reports and detailed XML results.

The tool automatically fetches the latest SCAP Security Guide content from ComplianceAsCode, ensuring scans always use the most up-to-date security benchmarks. It can be integrated into CI/CD pipelines or scheduled via cron for continuous compliance monitoring.

Capabilities

  • Automated STIG profile security scanning
  • Docker-based isolated scan environment
  • HTML report and XML results export
  • Auto-fetches latest SCAP Security Guide
  • CI/CD and cron integration ready
  • Timestamped scan output organization
Compliance STIG Docker OpenSCAP RHEL UBI9 Open Source