Closed
Description
arduino-esp32 uses a compromised version of tj-actions/changed-files. The compromised action appears to leak secrets the runner has in memory.
The action is included in:
Output of an affected run:
- https://github.com/espressif/arduino-esp32/actions/runs/13864794849/job/38801411946#step:3:91
Please review.
Learn about the compromise on StepSecurity of Semgrep.
This issue has been assigned CVE-2025-30066