github.com/aquasecurity/trivy-iac@v0.8.1-0.20240127024015-3d8e412cf0ab/avd_docs/google/iam/AVD-GCP-0068/docs.md (about) 1 2 In GitHub Actions, one can authenticate to Google Cloud by setting values for workload_identity_provider and service_account and requesting a short-lived OIDC token which is then used to execute commands as that Service Account. If you don't specify a condition in the workload identity provider pool configuration, then any GitHub Action can assume this role and act as that Service Account. 3 4 ### Impact 5 Allows an external attacker to authenticate as the attached service account and act with its permissions 6 7 <!-- DO NOT CHANGE --> 8 {{ remediationActions }} 9 10 ### Links 11 - https://www.revblock.dev/exploiting-misconfigured-google-cloud-service-accounts-from-github-actions/ 12 13