
Summary
The 'GitHub Malicious Commit Content' detection rule is designed to identify potential security threats in commit metadata on GitHub. It focuses on detecting malicious patterns such as injection payloads within commit messages, author names, and author emails, which are common vectors for executing malicious code in CI/CD workflows or via git hooks. Such metadata is often trusted and may not be adequately sanitized before processing, making it a target for attackers. This rule incorporates patterns derived from the Nx vulnerability (GHSA-cxm3-wv7p-598c), ensuring that threats related to code injection and supply chain attacks are effectively monitored. It emphasizes the high severity of detected threats, guiding security teams to promptly investigate and address any identified suspicious activities, particularly around author accounts and their associated workflows.
Categories
- Web
- Application
- Cloud
Data Sources
- Web Credential
- Application Log
- Logon Session
ATT&CK Techniques
- T1195.002
- T1098
Created: 2025-11-13