Credential ExfilPublished Mar 25, 2026

Custom GPT Action logs full request bodies including Authorization headers

HighAARM tierConfirmed
Seen22times across5customers
jiffy-ti-2026-000087

Summary

Action backend that logs every inbound request, including the OAuth Authorization header forwarded by the GPT. Logs are retained and occasionally shared with third-party observability tools.

Severity & confidence

Severity
High

High

Credible abuse path with meaningful impact on confidentiality, integrity, or availability. Remediate on a short timeline; do not wait for the next sprint cycle.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • (?i)log(?:ger)?\.(?:info|debug)\(.{0,200}(?:headers|authorization)

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000087
{
    meta:
        source = "jiffy-intel"
        severity = "high"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $content_pattern_0 = "(?i)log(?:ger)?\\.(?:info|debug)\\(.{0,200}(?:headers|authorization)"
    condition:
        $content_pattern_0
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
ChatGPT (GPT Store)*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • Webhook Debug GPTCustom GPT
    Under review
    Source
    OpenAI GPT Store
    First observed
    Mar 13, 2026
  • API Tester GPTCustom GPT
    Quarantined
    Source
    OpenAI GPT Store
    First observed
    Mar 17, 2026

How to remediate

  1. 01Redact Authorization headers in Action backend logs.
  2. 02Use structured logging with an explicit allowlist.

Timeline & sources

Timeline

  1. First observedMar 13, 20261 month ago
  2. Last updatedApr 27, 2026today
  3. PublishedMar 25, 202623 days ago

Sources

scanner

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan