## https://sploitus.com/exploit?id=FD42DB51-CAE0-52C1-B26C-16A8DB8196F7
# Checkmarx-CVE-2025-30066-Detection-Tool
These are tools for scanning your GitHub workflows and logs for potential malicious actions associated with CVE-2025-30066. It checks for a set of known risky GitHub Actions and a suspicious code snippet embedded in workflow files. As well for secrets that ended up being exposed to logs due to CVE-2025-30066.
# CxGithubActionsScan
## What It Scans
The script looks for the following in your workflow files:
GitHub Actions:
reviewdog/action-setup
reviewdog/action-shellcheck
reviewdog/action-composite-template
reviewdog/action-staticcheck
reviewdog/action-ast-grep
reviewdog/action-typos
tj-actions/changed-files
tj-actions/eslint-changed-files
Malicious Code Snippet:
A base64-encoded snippet:
IyEvdXNyL2Jpbi9lbnYgcHl0aG9uMwoKIyBiYXNlZCBvbiBodHRwczovL2RhdmlkZWJvdmUuY29tL2Jsb2cvP3A9MTY
## Scan Options
You can run the scan in one of three modes:
Organization Scan: Use the --org flag to scan all repositories within an organization.
Repository Scan: Use the --repo flag to scan a specific repository (format: owner/repo or a full GitHub URL).
User Scan: Use the --user flag to scan all repositories for a specific user.
## GitHub Personal Access Token (PAT)
To access repository content, you'll need a GitHub Personal Access Token (PAT) provided via the --token flag:
Organization Scans: The PAT must include the repo and read:org scopes.
User/Repository Scans: The PAT should have repo (for private repos) or public_repo (for public repos).
### How to Get Your GitHub PAT
1. Sign in to GitHub and click on your profile picture.
2. Navigate to Settings โ Developer settings โ Personal access tokens.
3. Click Generate new token, provide a descriptive name, and select the required scopes.
4. Generate and copy the token.
## Sample Command
To scan all repositories in an organization called myorg with the default keywords, run:
```python
python CxGithubActionsScan.py --org myorg --token YOUR_GITHUB_PAT
```
# CxGithub2msScan
**CxGithub2msScan** is a Python tool that downloads GitHub Actions workflow run logs for a specified repository and scans them using the Checkmarx 2ms tool to detect secrets or leaked keys.
## Requirements
- **Python 3.x**
- **2ms.exe** (Checkmarx 2ms CLI) must be available in your PATH or in the same directory as the script.
*Download the 2ms binary from: [https://github.com/Checkmarx/2ms](https://github.com/Checkmarx/2ms)*
- A **GitHub personal access token** with access to the repository's Actions logs.
## GitHub Personal Access Token (PAT)
To access repository content, you'll need a GitHub Personal Access Token (PAT) provided via the --token flag:
### How to Get Your GitHub PAT
1. Sign in to GitHub and click on your profile picture.
2. Navigate to Settings โ Developer settings โ Personal access tokens.
3. Click Generate new token, provide a descriptive name, and select the required scopes.
4. Generate and copy the token.
## Usage
Run the tool from the command line with the required arguments. For example:
```bash
python CxGithub2msScan.py --owner your_org --repo your_repo --days 7 --token YOUR_GITHUB_TOKEN --output logs