In the wake of the recent tj-actions/changed-files GitHub Action supply chain attack (CVE-2025-30066), security teams worldwide scrambled to assess their exposure and implement protective measures. The sophisticated attack compromised a widely-used GitHub Action with over 23,000 repositories affected, highlighting the critical importance of robust supply chain security.
At RAD Security, we've built our platform specifically to detect and prevent these types of attacks. Here's how our comprehensive security suite protects organizations from the tj-actions/changed-files compromise and similar supply chain threats.
On March 12, 2025, attackers compromised the popular tj-actions/changed-files GitHub Action. This action, which identifies file changes in pull requests and commits, is a core component in many CI/CD pipelines. The compromise allowed attackers to:
The widespread use of this action across thousands of repositories made this a particularly dangerous attack, with potentially far-reaching consequences.
RAD Security continuously scans container images throughout your environment, providing immediate alerts when compromised components are detected. For the tj-actions/changed-files attack:
# Sample detection output
IMAGE: github-runner:latest
FINDING: Supply Chain Compromise [CRITICAL]
DETAILS: Image contains GitHub Action tj-actions/changed-files@v41.0.1
(affected by CVE-2025-30066)
RECOMMENDATION: Rebuild with patched version or alternative action
The tj-actions/changed-files compromise exhibits specific behavioral patterns that RAD Security's runtime monitoring can detect:
Our behavioral analysis engine establishes baselines of normal CI/CD operations and flags deviations that indicate compromise, stopping attacks in progress before they can spread.
RAD Security's Admission Guard provides proactive protection by:
ADMISSION DENIED:
Resource: Deployment/github-runner
Reason: Image contains compromised GitHub Action (tj-actions/changed-files@v41.0.1)
Policy: supply-chain-integrity-check
Our threat detection capabilities leverage multiple signals to identify compromise patterns:
While detection is critical, RAD Security goes further with actionable remediation:
A RAD Security customer in the financial sector recently experienced an attempted attack leveraging the compromised GitHub Action. Our platform detected unusual network connections from their CI environment within minutes of the compromise attempt, allowing their security team to:
The entire incident was contained before any sensitive data could be compromised, saving potentially millions in breach costs and regulatory penalties.
If you're concerned about exposure to the tj-actions/changed-files attack or similar supply chain compromises:
The tj-actions/changed-files attack represents a sophisticated evolution in supply chain attacks, targeting the very tools developers rely on to build secure software. With RAD Security's multi-layered approach to detection and protection, organizations can identify compromised components, detect exploitation attempts, and maintain the integrity of their software supply chain.
In an era where supply chain attacks are becoming increasingly common and sophisticated, RAD Security provides the comprehensive visibility and protection needed to build with confidence.
Want to see how RAD Security can protect your organization from supply chain attacks? Test Drive RAD today.