Skip to content

Commit 7c15993

Browse files
committed
[New Rule] Tampering with RUNNER_TRACKING_ID in GitHub Actions Runners
1 parent 3d83e47 commit 7c15993

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

rules/cross-platform/execution_via_github_runner_with_audit_disabled_via_env_vars.toml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,15 @@ updated_date = "2025/11/27"
77
[rule]
88
author = ["Elastic"]
99
description = """
10-
This rule detects the execution of processes via GitHub Actions runners with audit logging disabled through environment variables.
11-
Such activity may indicate an attempt to evade detection while executing potentially malicious code in a CI/CD environment. This
12-
activity was observed in the Shai-Hulud worm, which abused GitHub Actions runners to propagate itself while disabling audit
13-
logging by setting the RUNNER_TRACKING_ID environment variable to 0.
10+
This rule detects processes spawned by GitHub Actions runners where "RUNNER_TRACKING_ID" is overridden from its
11+
default "github_*" value. Such tampering has been associated with attempts to evade runner tracking/cleanup on
12+
self-hosted runners, including behavior observed in the Shai-Hulud 2.0 npm worm campaign.
1413
"""
1514
from = "now-9m"
1615
index = ["logs-endpoint.events.process*"]
1716
language = "eql"
1817
license = "Elastic License v2"
19-
name = "Execution via GitHub Runner with Audit Disabled via Environment Variables"
18+
name = "Tampering with RUNNER_TRACKING_ID in GitHub Actions Runners"
2019
references = [
2120
"https://www.elastic.co/blog/shai-hulud-worm-npm-supply-chain-compromise",
2221
"https://socket.dev/blog/shai-hulud-strikes-again-v2",

0 commit comments

Comments
 (0)