Skip to content

[isolation] [PROC-ENV] Same-UID /proc environ exposes token-like AWF variable metadata #1787

@github-actions

Description

@github-actions

Isolation boundary finding from run 24126129940.

Summary

Within the agent container, runner-owned processes can read other runner-owned processes' /proc/<pid>/environ entries and observe token-like variable presence and non-zero length. In this run, AWF_ONE_SHOT_TOKENS was observable (key name + length only; value intentionally not captured).

This indicates an intra-UID process isolation gap for environment-resident secret material.

Boundary Type

Process isolation / secret exposure via procfs (/proc/<pid>/environ) across same UID.

Methodology

Focused deep-dive on process boundary controls:

  • Process lineage and proc metadata correlation (ps, /proc/<pid>/status, /proc/<pid>/stat)
  • Same-UID key+length-only census over /proc/<pid>/environ
  • Cross-process syscall barriers tested with synthetic probes:
    • process_vm_readv (expected denied, observed EPERM)
    • pidfd_open + pidfd_getfd (expected denied, observed EPERM)

Reproduction (value-safe)

  1. Identify active runner-owned PIDs in the process chain (e.g., awf-cmd-1.sh, bash, node, codex).
  2. For each PID, parse /proc/<pid>/environ as NUL-separated entries.
  3. Check for AWF_ONE_SHOT_TOKENS key presence only and compute length only from the matched entry.
  4. Observe non-zero length across multiple same-UID processes.

Observed Results

  • /proc/<pid>/environ for runner processes is mode 0400 and readable by same UID.
  • AWF_ONE_SHOT_TOKENS key appeared in multiple runner-owned processes with non-zero length.
  • No secret values were extracted or logged.
  • Additional hardening controls are present (process_vm_readv and pidfd_getfd denied with EPERM), but procfs environ visibility remains.

Version Information

  • Lock file: .github/workflows/secret-digger-codex.lock.yml
  • cli_version field: not present in lock metadata
  • compiler_version: v0.67.2
  • Generated-by header: gh-aw (v0.67.2)

Suggested Mitigations

  • Avoid storing sensitive token material in process environments where possible.
  • Consider process-level secret delivery mechanisms that are not exposed via procfs environ.
  • Consider additional procfs isolation hardening where compatible with runner operation.

Generated by Secret Digger (Codex) ·

  • expires on Apr 9, 2026, 8:45 AM UTC

Metadata

Metadata

Assignees

No one assigned

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions