Checking for stored secrets in the environment of a runner.

Intercepting or forging GitHub Webhooks to trigger malicious builds.

Exploiting vulnerable CI/CD pipelines where secrets are printed to logs or where pull_request triggers allow for unauthorized code execution .

Analysts begin by scanning for open ports and services.

While there isn't a single "official" document by that name, write-ups for challenges involving GitHub anomalies generally follow this path: 1. Enumeration & Discovery