@hulumi/policies: GitHub OIDC trust policy bypass via AWS set-qualified condition operators
Critical severity
GitHub Reviewed
Published
May 15, 2026
in
kerberosmansour/hulumi
•
Updated May 21, 2026
Description
Published to the GitHub Advisory Database
May 21, 2026
Reviewed
May 21, 2026
Last updated
May 21, 2026
Impact: @hulumi/policies versions before 1.3.2 only checked exact AWS IAM StringLike/StringEquals condition operator keys in G_OIDC_1. Set-qualified operators such as ForAnyValue:StringLike could hide wildcard GitHub Actions OIDC sub conditions from the mandatory guardrail.
Patched in 1.3.2: the AWS trust-policy inspector now evaluates set-qualified string operators and rejects unsafe GitHub OIDC sub conditions.
Remediation: upgrade @hulumi/policies to 1.3.2 or later.
References