
adnanthekhan.com/2024/04/15/an-obscure-actions-workflow-vulnerability-in-googles-flank
Preview meta tags from the adnanthekhan.com website.
Linked Hostnames
12- 8 links togithub.com
- 6 links toadnanthekhan.com
- 2 links toboostsecurityio.github.io
- 1 link toapi.whatsapp.com
- 1 link toapp.stepsecurity.io
- 1 link tofacebook.com
- 1 link togohugo.io
- 1 link tonews.ycombinator.com
Thumbnail

Search Engine Appearance
An Obscure Actions Workflow Vulnerability in Google's Flank
Introduction Recently, I reported a “Pwn Request” vulnerability in Google’s Flank repository. Flank is described as a “Massively parallel Android and iOS test runner for Firebase Test Lab” and is an official Google open source project. The vulnerability allowed anyone with a GitHub Account to steal Google service account credentials which were used as a repository secret along with obtaining access to a GITHUB_TOKEN with write access. Google’s VRP rewarded me with a $7,500 bug bounty for this report as a Software Supply Chain compromise under the “Standard OSS Project” tier.
Bing
An Obscure Actions Workflow Vulnerability in Google's Flank
Introduction Recently, I reported a “Pwn Request” vulnerability in Google’s Flank repository. Flank is described as a “Massively parallel Android and iOS test runner for Firebase Test Lab” and is an official Google open source project. The vulnerability allowed anyone with a GitHub Account to steal Google service account credentials which were used as a repository secret along with obtaining access to a GITHUB_TOKEN with write access. Google’s VRP rewarded me with a $7,500 bug bounty for this report as a Software Supply Chain compromise under the “Standard OSS Project” tier.
DuckDuckGo

An Obscure Actions Workflow Vulnerability in Google's Flank
Introduction Recently, I reported a “Pwn Request” vulnerability in Google’s Flank repository. Flank is described as a “Massively parallel Android and iOS test runner for Firebase Test Lab” and is an official Google open source project. The vulnerability allowed anyone with a GitHub Account to steal Google service account credentials which were used as a repository secret along with obtaining access to a GITHUB_TOKEN with write access. Google’s VRP rewarded me with a $7,500 bug bounty for this report as a Software Supply Chain compromise under the “Standard OSS Project” tier.
General Meta Tags
13- titleAn Obscure Actions Workflow Vulnerability in Google's Flank | Adnan Khan's Blog
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1, shrink-to-fit=no
- robotsindex, follow
Open Graph Meta Tags
7- og:urlhttps://adnanthekhan.com/2024/04/15/an-obscure-actions-workflow-vulnerability-in-googles-flank/
- og:site_nameAdnan Khan's Blog
- og:titleAn Obscure Actions Workflow Vulnerability in Google's Flank
- og:descriptionIntroduction Recently, I reported a “Pwn Request” vulnerability in Google’s Flank repository. Flank is described as a “Massively parallel Android and iOS test runner for Firebase Test Lab” and is an official Google open source project. The vulnerability allowed anyone with a GitHub Account to steal Google service account credentials which were used as a repository secret along with obtaining access to a GITHUB_TOKEN with write access. Google’s VRP rewarded me with a $7,500 bug bounty for this report as a Software Supply Chain compromise under the “Standard OSS Project” tier.
- og:localeen-us
Twitter Meta Tags
4- twitter:cardsummary_large_image
- twitter:imagehttps://adnanthekhan.com/wp-content/uploads/2024/03/image-1.png
- twitter:titleAn Obscure Actions Workflow Vulnerability in Google's Flank
- twitter:descriptionIntroduction Recently, I reported a “Pwn Request” vulnerability in Google’s Flank repository. Flank is described as a “Massively parallel Android and iOS test runner for Firebase Test Lab” and is an official Google open source project. The vulnerability allowed anyone with a GitHub Account to steal Google service account credentials which were used as a repository secret along with obtaining access to a GITHUB_TOKEN with write access. Google’s VRP rewarded me with a $7,500 bug bounty for this report as a Software Supply Chain compromise under the “Standard OSS Project” tier.
Link Tags
7- apple-touch-iconhttps://adnanthekhan.com/apple-touch-icon.png
- canonicalhttps://adnanthekhan.com/2024/04/15/an-obscure-actions-workflow-vulnerability-in-googles-flank/
- iconhttps://adnanthekhan.com/favicon.ico
- iconhttps://adnanthekhan.com/favicon-16x16.png
- iconhttps://adnanthekhan.com/favicon-32x32.png
Website Locales
1en
https://adnanthekhan.com/2024/04/15/an-obscure-actions-workflow-vulnerability-in-googles-flank/
Links
25- https://adnanthekhan.com
- https://adnanthekhan.com/about
- https://adnanthekhan.com/archives
- https://adnanthekhan.com/posts
- https://adnanthekhan.com/search