
mass github repo backdooring via CI workflows(Megalodon)
automated campaign pushes over 5,700 malicious commits to 5,561 GitHub repositories in just six hours and the attacker using throwaway accounts with random names and forged commit authors like build-bot, auto-ci, ci-bot, and pipeline-bot all with messages like "ci: add build optimization step" or "chore: optimize pipeline runtime." Basically indistinguishable from routine CI noise.