RageAgainstThePixel/setup-steamcmd leaked authentication token in job output logs
        
  High severity
        
          GitHub Reviewed
      
        Published
          Jul 19, 2025 
          in
          
            RageAgainstThePixel/setup-steamcmd
          
          •
          Updated Jul 21, 2025 
      
  
Package
Affected versions
< 1.3.0
  Patched versions
1.3.0
  Description
        Published to the GitHub Advisory Database
      Jul 21, 2025 
    
  
        Reviewed
      Jul 21, 2025 
    
  
        Last updated
      Jul 21, 2025 
    
  
Summary
Log output includes authentication token that provides full account access
Details
The post job action prints the contents of
config/config.vdfwhich holds the saved authentication token and can be used to sign in on another machine. This means any public use of this action leaves authentication tokes for the associated steam accounts publicly available. Additionally,userdata/$user_id$/config/localconfig.vdfcontains potentially sensitive information which should not be included in public logs.PoC
Use the following workflow step
Impact
Anyone who has used this workflow action with a steam account is affected and has had valid authentication tokens leaked in the job logs. This is particularly bad for public repositories, as anyone with a GitHub account can access the logs and view the token.
References