/top/
/new/
/best/
/ask/
/show/
/job/
^
slacker news
login
about
←back to thread
Public secrets exposure leads to supply chain attack on GitHub CodeQL
(www.praetorian.com)
297 points
cyberbender
| 3 comments |
30 Mar 25 19:54 UTC
|
HN request time: 0.238s
|
source
1.
ryao
◴[
30 Mar 25 22:00 UTC
]
No.
43528076
[source]
▶
>>43527044 (OP)
#
I put CodeQL in use in OpenZFS PRs. This is not an issue for OpenZFS. None of our code is secret. :)
replies(2):
>>43528995
#
>>43529721
#
ID:
GO
2.
◴[
30 Mar 25 23:44 UTC
]
No.
43528995
[source]
▶
>>43528076 (TP)
#
3.
asmosoinio
◴[
31 Mar 25 01:29 UTC
]
No.
43529721
[source]
▶
>>43528076 (TP)
#
I don't think this is a good take: Even if your code is not secret, the attack could add anything to your code or release artifacts.
Luckily it was quickly remedied at least.
↑