Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that
✦ Editorial Summary
A GitHub Action maintained by AppSec vendor Xygeni was compromised via a "tag poison" attack. Attackers operated a command and control (C2) implant for up to a week, exploiting the vulnerability. The compromised action is xygeni/xygeni-action.
Dark Reading·darkreading.com·Mar 11, 2026·1 min read· pts
WOKHEI The excerpt above is sourced from the original publication. WokHei does not add editorial bias. Click the link below to read the full article at the source.
Discussion
Join the discussion
Sign in for a verified badge and your comments appear instantly. Or post anonymously — anonymous comments are held briefly for moderation.