
Summary
The GitHub Actions Unusual Bot Push to Repository rule detects when the GitHub Actions bot pushes code to a repository for the first time within a specified time period (9 minutes ago to now). This behavior may indicate a supply chain attack where a malicious actor exploits GitHub Actions to modify repository contents or inject backdoor workflows. False positives can occur during legitimate CI/CD automation operations such as Dependabot merges or automated version updates. Key investigation steps include reviewing the affected repository, checking workflow runs, examining commit history, and searching for suspicious files in the workflows directory. The alert uses the KQL query to filter actions relating to bot pushes and operates on GitHub's audit logs. This detection is critical for organizations relying on GitHub for their CI/CD processes as it helps identify potential CD/CI vulnerabilities in the supply chain.
Categories
- Cloud
- Infrastructure
- Web
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1195
- T1195.002
- T1059
Created: 2025-12-09