GHSA-q2f7-m237-v562CriticalDisclosed before NVD

@hulumi/policies: GitHub OIDC trust policy bypass via AWS set-qualified condition operators

Published
May 21, 2026
Last Modified
May 21, 2026

📋 Description

Impact: @hulumi/policies versions before 1.3.2 only checked exact AWS IAM StringLike/StringEquals condition operator keys in G_OIDC_1. Set-qualified operators such as ForAnyValue:StringLike could hide wildcard GitHub Actions OIDC sub conditions from the mandatory guardrail. Patched in 1.3.2: the AWS trust-policy inspector now evaluates set-qualified string operators and rejects unsafe GitHub OIDC sub conditions. Remediation: upgrade @hulumi/policies to 1.3.2 or later.

🎯 Affected products1

  • npm/@hulumi/policies:< 1.3.2

🔗 References (2)