GHSA-q2f7-m237-v562CriticalDisclosed before NVD
@hulumi/policies: GitHub OIDC trust policy bypass via AWS set-qualified condition operators
📋 Description
Impact: @hulumi/policies versions before 1.3.2 only checked exact AWS IAM StringLike/StringEquals condition operator keys in G_OIDC_1. Set-qualified operators such as ForAnyValue:StringLike could hide wildcard GitHub Actions OIDC sub conditions from the mandatory guardrail.
Patched in 1.3.2: the AWS trust-policy inspector now evaluates set-qualified string operators and rejects unsafe GitHub OIDC sub conditions.
Remediation: upgrade @hulumi/policies to 1.3.2 or later.
🎯 Affected products1
- npm/@hulumi/policies:< 1.3.2