- Gamkers Newsletter
- Posts
- A $11,850 Supply Chain Bug in GitLab Runner
A $11,850 Supply Chain Bug in GitLab Runner
How GitLab Reinforces Trust in Open Source by Justas_b (Medium, August 22, 2025)
Incident Snapshot
Researchers discovered that GitLab Runner, the tool responsible for executing CI/CD jobs, failed to properly verify the SHA256 checksum of downloaded binaries.
This meant that if someone swapped out the legitimate runner binary with a malicious one, the runner would still trust and execute it—no questions asked. The malicious binary could then:
Capture pipeline secrets (like API tokens, SSH keys, or passwords).
Send those secrets to an attacker-controlled server.
Allow deeper compromises of entire DevOps pipelines.
GitLab rewarded the researcher $11,850 for responsibly reporting the bug.
Why This Happened
Checksum Not Enforced
The runner downloaded and executed binaries without validating their integrity.
This oversight left the door open for tampering at any point in the supply chain.
False Sense of Security in Containers
Many developers assumed that running GitLab Runner in a Docker container offered isolation.
But if the binary inside the container was malicious, the container couldn’t prevent secrets from leaking.
Supply Chain Weaknesses
Attackers could build a malicious runner binary and distribute it through typosquatted Docker Hub repos, deceptive tutorials, or misleading documentation.
Users pulling the wrong image might never realize they’d installed a compromised version.

Impact — CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H 8.3 (High)
Potential Real-World Impact
If unpatched, this bug could have enabled:
Widespread credential theft from organizations relying on CI/CD pipelines.
Persistent backdoors in software supply chains.
Reputational and regulatory fallout if customer data was exposed.
GitLab’s Response
GitLab didn’t brush it off as a “user misconfiguration.” Instead, they:
Patched the runner to enforce checksum validation.
Hardened their release process.
Publicly acknowledged the researcher with a bounty, reinforcing community trust.
This proactive stance shows GitLab’s seriousness about supply chain security—especially in an era where CI/CD pipelines are prime targets\
The Fix & Bounty
The GitLab backend validates the runner’s binary SHA against a whitelist of official builds before dispatching jobs. This way a Gitlab main application won’t accidentally “give away” sensitive data to a tempered runner.

Bounty
Conclusion
Docker and other containers aren’t always bulletproof.
We Look Forward to share more Insights in our next Newsletter !
Newsletter will be posted on every week
Share your findings, learn from others, and grow with the community 💛
from Gamkers Team - By Balaji R
New here? Check our Discord Community and Instagram Buddy!