logoalt Hacker News

robinhoodexelast Sunday at 2:27 PM1 replyview on HN

Wouldn’t the IP allowlist feature on the GitHub organisation work wonders for this kind of attack?


Replies

moh_quzlast Monday at 9:16 AM

That definitely helps, but I don't think it solves the compromised machine scenario.

If the attacker has shell access to the dev's laptop, they are likely just running commands directly from that machine (or proxying through it). So to GitHub, the traffic still looks like it's coming from the allowed IP.

Allowlists are mostly for stopping usage of a token that got stolen and taken off-device.