Merged
Conversation
Adds a new security workflow that reviews recent code changes for suspicious patterns indicating malicious activity or supply chain attacks. The workflow scans all files changed in the last 3 days and looks for: - Secret exfiltration patterns (credentials + external network calls) - Out-of-context code additions (executables in source dirs, encoded payloads) - Suspicious system operations (sensitive file access, privilege escalation) - Code obfuscation (base64/hex payloads, obscure naming) Findings are published as GitHub code-scanning alerts in the Security tab. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Contributor
|
THis is too corner case |
dsyme
approved these changes
Feb 21, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR adds a new Daily Malicious Code Scan security workflow, along with its documentation page and README entry.
Phase 1: Consistency Check
No inconsistencies were found between
./workflows/,./docs/, andREADME.md. All workflow files have matching docs pages and README entries.Phase 2: New Workflow — Daily Malicious Code Scan
Source
Adapted from
daily-malicious-code-scan.mdin the gh-aw repository.Merge Rate
The security workflow family is documented in the [Security-related Workflows blog post]((github.github.io/redacted) The Daily Malicious Code Scan complements other security tools (CodeQL, Dependabot) with change-focused analysis of recent commits.
Why It's Valuable
As AI-assisted code generation becomes common, new supply chain risks emerge — a compromised agent or dependency could silently inject credential-harvesting code, a crypto miner, or a backdoor. This workflow:
Generalization Plan
The original workflow contained Go-specific file location checks (e.g., verifying Go files are inside
cmd/orpkg/directories). These were replaced with language-agnostic checks:create-code-scanning-alertoutput (GitHub native, works in any repo)Files Changed
workflows/daily-malicious-code-scan.md— generalized workflow specdocs/daily-malicious-code-scan.md— documentation pageREADME.md— new "Security Workflows" section with entry