Microsoft guidance regarding credentials leaked to GitHub Actions Logs through Azure CLI

Microsoft Security Header
Summary Summary The Microsoft Security Response Center (MSRC) was made aware of a vulnerability where Azure Command-Line Interface (CLI) could expose sensitive information, including credentials, through GitHub Actions logs. The researcher, from Palo Alto Networks Prisma Cloud, found that Azure CLI commands could be used to show sensitive data and output to Continuous Integration and Continuous Deployment (CI/CD) logs.

Source – Microsoft Security Response Center

All content and images belong to their respected owners, this article is curated for informational purposes only.

Previous Post
exchange server header

How to troubleshoot Exchange Online Transport Rules using the Test-Message cmdlet

Next Post
citrix logo header

How to attach USB drive as a local Storage on XenServer

Related Posts