← Incident Index
EnterpriseDeveloper Tools·April 15, 2021Draft

Codecov: Codecov bash-uploader supply-chain compromise exfiltrates customer secrets

A threat actor exploited an error in Codecov's Docker image creation process to obtain credentials, then modified the Bash Uploader script to exfiltrate environment variables (including secrets) from customer CI environments.

Velocity Governance perspective· Sentinel-10 overlap: 1 of 4

1 of the 4 practices that failed in this incident is part of the Sentinel-10 — the engineering protocols Concordance flags as most degraded under AI-accelerated development.

This incident pre-dates today's AI-velocity surge. The thesis is that the same practices that failed here will fail faster under AI velocity if not actively governed. Read the Velocity Governance thesis →

Impact

29,000
Affected

Affected ~29,000 enterprise customers including HashiCorp, Atlassian, Twilio, Rapid7. Triggered industry-wide review of CI/CD secret handling.

Root cause (from published RCA)

A flaw in Codecov's Docker image creation process allowed a malicious actor to extract credentials needed to modify the Bash Uploader script. The modified script remained in production for over 2 months before detection. The script was downloaded directly via curl by customer CI pipelines, which executed it with access to environment variables containing credentials.

Concordance protocols that map to this root cause

Click any protocol to see every other indexed incident where it failed.

Protocol 4.8Build Reproducibility· Testingsee all incidents →
Build reproducibility: the bash-uploader script lacked checksum verification, allowing silent server-side modification to propagate undetected.
Protocol 3.9Secrets Management· DevelopmentSENTINELsee all incidents →
Secrets management: customer CI environments executed the script with broad environment-variable access, magnifying blast radius.
Protocol 4.2CI Gating· Testingsee all incidents →
CI gating: customers ran `curl | bash` against an external script with no integrity verification — a known anti-pattern that CI gating policies should have prevented.
Protocol 6.1Incident Response· Operationssee all incidents →
Incident response: the modified script remained in production for 2+ months, indicating insufficient supply-chain monitoring.

Primary sources

Codecov Security Update
Codecov · April 15, 2021
Codecov Bash Uploader Investigation Update
Codecov · January 15, 2022

Related incidents

Other incidents that failed at least one of the same protocols.

SolarWindsDec 2020
SUNBURST malware injected into Orion build pipeline compromises 18,000…
CrowdStrikeJul 2024
Falcon sensor channel-file update crashes 8.5M Windows hosts
xz utils (Tukaani Project)Mar 2024
CVE-2024-3094 — multi-year social-engineering attack inserts backdoor …
OktaOct 2023
Okta support-portal HAR file leak exposes 134 customer environments
#supply-chain#curl-bash#secrets-exfil#ci-cd#integrity-verification
Check your repo against these protocols.
Concordance scores any public GitHub repo against all 50 engineering protocols in 60 seconds. No signup, no install.
Run a free scan →
Concordance Incident Index entry · CC BY 4.0 · Methodology · Errata: hello@concordancelabs.com