BotBeat
...
← Back

> ▌

Hashgraph OnlineHashgraph Online
INDUSTRY REPORTHashgraph Online2026-04-08

Supply Chain Attack: Hashgraph Online Deployed Malicious GitHub Actions Across 250+ MCP Repositories

Key Takeaways

  • ▸A coordinated campaign used 64+ sockpuppet accounts to inject malicious GitHub Actions workflows into 250+ repositories, escalating across five distinct phases of access
  • ▸The attack exploited GitHub's OIDC token system by requesting id-token: write permissions and exfiltrating signed JWTs to external servers controlled by Hashgraph Online
  • ▸The campaign began with ecosystem seeding (awesome-lists and plugin registries), progressed through contribution establishment and tool legitimization, before deploying the weaponized workflow at scale
Source:
Hacker Newshttps://www.wshoffner.dev/blog/anatomy-of-a-github-actions-supply-chain-attack-targeting-mcp-repos↗

Summary

Security researcher ticktockbent uncovered a sophisticated five-phase supply chain attack targeting over 250 repositories in the Model Context Protocol (MCP) ecosystem. The campaign, orchestrated by a single organization (Hashgraph Online) using 64+ sockpuppet accounts, began in late March 2026 and included malicious GitHub Actions workflows designed to exfiltrate GitHub OIDC tokens to third-party servers. The attack masqueraded as legitimate skill validation tools, with the malicious action automatically minting signed JWTs and uploading them to hol.org during every push and pull request. The initial compromise vector involved seeding awesome-lists and plugin registries with entries for Hashgraph Online tools, establishing credibility before distributing the weaponized workflow across the broader developer community.

  • MCP repositories and developers using Hashgraph Online tools were compromised without awareness, as the malicious actions were hidden in seemingly innocuous workflow additions

Editorial Opinion

This attack represents a particularly sophisticated abuse of trust in open-source contribution workflows and GitHub's automation infrastructure. By starting with high-visibility list contributions and gradually establishing organizational credibility through legitimate-looking bug fixes and documentation, the threat actors created plausible deniability and social proof before deploying their payload. The incident highlights the urgent need for stricter controls around OIDC token issuance, repository security policies that require explicit approval for new third-party actions, and community verification mechanisms for widely-used tools in emerging ecosystems like MCP.

AI AgentsMLOps & InfrastructureCybersecurityEthics & Bias

Comments

Suggested

QVerisQVeris
PRODUCT LAUNCH

QVeris Launches AI Agents Platform Enabling Access to 10K Capabilities Through Unified Protocol

2026-04-08
OpenAIOpenAI
OPEN SOURCE

AWAF v1.3 Launches: Open Framework for Measuring AI Agent Production Readiness

2026-04-08
OpenAIOpenAI
RESEARCH

Study Reveals ChatGPT's Weaknesses in Scientific Assessment, Offers New Framework for AI-Era Education

2026-04-08
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us