Summary
Your pr-quality-check.yaml workflow is vulnerable to the classic "Pwn Request" pattern — it uses pull_request_target to check out and execute untrusted fork code with contents: write and pull-requests: write permissions. This was recently exploited by an automated bot that achieved remote code execution and exfiltrated the GITHUB_TOKEN from this repository.
Between February 28, 2026, the hackerbot-claw bot opened 6 pull requests against this repository (#6058, #6059, #6060, #6061, #6068, #6069).
Recommended fixes
- Switch from
pull_request_target to pull_request — Fork PRs won't have access to secrets with pull_request. This is the simplest and safest fix.