logoalt Hacker News

gfodyyesterday at 6:12 PM2 repliesview on HN

I guess it's somewhat known that you can trivially fake a repo w/a fork like this but it still feels like a bigger security risk than the "this commit comes from another repository" banner gives it credit for:

https://github.com/cline/cline/commit/b181e0


Replies

cedwsyesterday at 7:51 PM

Yes, this has been an issue for so long and GitHub just doesn't care enough to fix it.

There's another way it can be exploited. It's very common to pin Actions in workflows these days by their commit hash like this:

  - uses: actions/checkout@378343a27a77b2cfc354f4e84b1b4b29b34f08c2
But this commit doesn't even have to belong to the preceding repository. You can reference a commit on a fork. Great way to sneak in an xz-utils style backdoor into critical CI workflows.

GitHub just doesn't care about security. Actions is a security disaster and has been for over a decade. They would rather spend years migrating to Azure for no reason and have multiple outages a week than do anything anybody cares about.

show 2 replies
causalyesterday at 6:17 PM

Yeah the way Github connects forks behind the scenes has created so many gotchas like this, I'm sure it's a nightmare to fix at this point but they definitely hold some responsibility here.