[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fmtXVORhZhysFlvVSMwkoZRipSYmkzZHnj-CN8mTj9so":3},{"article":4,"iocs":54},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":33,"category":34,"article_tags":38},"596c87f2-f1e1-4038-aa8b-6fece2b2130e","Packagist Urges Immediate Composer Update After GitHub Actions Token Leak","packagist-urges-immediate-composer-update-after-github-actions-token-leak-e1f413","Packagist is urgently warning PHP projects to update Composer after a GitHub token format change caused some GitHub Actions tokens to be exposed in CI logs. Composer 2.9.8, 2.2.28 LTS, and 1.10.28 fix a vulnerability where Composer could print the full contents of GitHub Actions-issued GITHUB_TOKEN values or GitHub App installation tokens to stderr when the token failed Composer’s validation check. The issue was triggered by GitHub’s rollout of a new token format that includes a hyphen, which Composer’s previous validation regex did not allow. GitHub announced the token format change on April 24, saying newly issued GitHub App installation tokens would move to a longer, variable-length format using ghs_APPID_JWT, with rollout beginning April 27 and continuing over the following weeks. GitHub specifically advised developers to treat tokens as opaque strings and avoid validating them against hardcoded patterns. The concern is that if a PHP project runs Composer in GitHub Actions and the workflow uses one of the new token formats, Composer may reject the token and print it into the Actions log. Packagist says the issue can occur through common GitHub Actions setups, including workflows where actions such as shivammathur\u002Fsetup-php automatically register GITHUB_TOKEN in Composer’s global auth.json. GitHub has since rolled back the token format change, according to Packagist co-founder Nils Adermann. That reduces the immediate risk of new leaks from this specific rollout, but it does not remove the need to update Composer. The exposure window is limited in many cases, but teams should still treat this as urgent. Packagist notes that GitHub-hosted runner tokens usually expire when the job ends, or after a maximum of 6 hours. For self-hosted runners, a leaked GITHUB_TOKEN may remain valid for up to 24 hours after issuance. Tokens created through GitHub Apps may have different scopes and should be reviewed based on the permissions requested. Packagist.org itself is not affected, as the public registry does not use a GitHub App and does not run Composer against GitHub App installation tokens. Private Packagist has already applied the Composer fix and audited update logs, with no token exposure found. The main risk is for projects running Composer in GitHub Actions, especially where workflows or setup actions register GITHUB_TOKEN into Composer authentication. Update Composer Immediately # Teams running Composer in GitHub Actions should update to Composer 2.9.8 or 2.2.28 LTS immediately. Composer 1.10.28 also includes the fix for legacy users, though Packagist recommends users upgrade to Composer 2.x where possible. Packagist has also updated its guidance after GitHub rolled back the token format change: UPDATE May 13, 2026 2:30 PM UTC: GitHub has rolled back their change to GitHub Actions tokens. It is no longer necessary to immediately disable GitHub Actions. We now have a few days to get the entire PHP ecosystem updated to safe Composer versions, before a new rollout of the new token format is attempted. GitHub is also looking into improving their secrets masking. Ideally a new rollout will not lead to any leaked credentials, even if they are accidentally exposed in logs. Teams should still review recent Actions logs for failed Composer runs that may have printed tokens, delete affected log contents where possible, and check for unexpected activity tied to any exposed credentials. The fix removes the rejected token value from Composer’s error message and relaxes the validation character set to accept the new GitHub token format. More broadly, this incident is a reminder that access tokens should not be parsed or validated against assumptions about length or character set, especially when platforms are actively changing token formats. GitHub’s own guidance is to avoid hardcoded token patterns entirely.","Packagist urgently warned PHP projects to update Composer after a GitHub token format change caused authentication tokens to be exposed in GitHub Actions CI logs. Composer versions 2.9.8, 2.2.28 LTS, and 1.10.28 fix a vulnerability where the tool would print full GITHUB_TOKEN or GitHub App installation token values to stderr when validation failed against an outdated regex pattern. Although GitHub has since rolled back the token format change, the fix is critical for projects that may have already exposed credentials during the brief exposure window.","Composer vulnerability exposed GitHub Actions tokens in CI logs due to token format validation regex mismatch.","Security Newsfsnotify Maintainer Dispute Sparks Supply Chain ConcernsA dispute over fsnotify maintainer access set off supply chain alarms around one of Go’s most widely used filesystem libraries.By Sarah Gooding - May 08, 2026","https:\u002F\u002Fsocket.dev\u002Fblog\u002Fpackagist-urges-immediate-composer-update?utm_medium=feed","https:\u002F\u002Fcdn.sanity.io\u002Fimages\u002Fcgdhsj6q\u002Fproduction\u002F53eba9063cf50df4d6f251fc17f0eb10144405c4-2048x2048.jpg?w=1000&q=95&fit=max&auto=format","2026-05-13T14:08:18.701+00:00","2026-05-13T16:00:20.094684+00:00",9,[18,21,24,26,28,31],{"name":19,"type":20},"Composer","product",{"name":22,"type":23},"Packagist","vendor",{"name":25,"type":20},"GitHub Actions",{"name":27,"type":23},"GitHub",{"name":29,"type":30},"PHP","technology",{"name":32,"type":20},"shivammathur\u002Fsetup-php","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":33,"icon":35,"name":36,"slug":37},null,"Vulnerabilities","vulnerabilities",[39,44,49],{"category":40},{"id":41,"icon":35,"name":42,"slug":43},"26b0b636-0e31-4db1-bffb-61bdf9f20a58","Supply Chain","supply-chain",{"category":45},{"id":46,"icon":35,"name":47,"slug":48},"2c8f44d4-b56e-47cf-9677-04f22c9ee78d","Identity & Access","identity-access",{"category":50},{"id":51,"icon":35,"name":52,"slug":53},"ade75414-7914-4e23-a450-48b64546ee70","Open Source","open-source",[55],{"type":56,"value":57,"context":58},"malware","GITHUB_TOKEN exposure via Composer stderr","Leaked authentication tokens printed to GitHub Actions CI logs when Composer validation fails"]