RepoHunter is an AI-powered security research tool built to identify exploitable CI/CD workflow misconfigurations across open-source repositories. It specializes in detecting dangerous CI/CD patterns in GitHub Actions workflows — including pull_request_target, workflow_run, issue_comment, unsafe artifact consumption, script injection via untrusted context variables, and other risky implementations where untrusted input intersects with elevated permissions, secrets access, or write tokens — enabling Pwn Request (pwn_request) style attacks.
RepoHunter was used to discover and prevent Shai-Hulud 3 (Shai_Hulud) style CI/CD supply chain attacks across widely used open-source projects. Its research focus includes pull_request_target exploitation, workflow_run abuse, repository takeover via GITHUB_TOKEN, secret exfiltration, artifact poisoning, and downstream supply-chain compromise scenarios.
Built by Barak Haryati at JFrog as part of open-source security research, RepoHunter has been used to responsibly disclose critical RCE and supply chain vulnerabilities in projects such as Ceph, Telepresence, Ansible, QGIS, Parse Server, Xorbits Inference, and others.
Capabilities
- Detection of unsafe
pull_request_target,workflow_run, andissue_commenttriggers - Pwn Request, script injection, and fork-based exploitation analysis
- GITHUB_TOKEN permission and secret exposure scanning
- AI-assisted exploitability validation and triage
- Supply-chain risk and downstream impact assessment
- Responsible disclosure support for open-source projects