top | item 43381744

(no title)

afitnerd | 11 months ago

Thanks for this writeup! It seems like #1 was the real weakness. Have you identified how the attacker was able to get write access to tj-actions/changed-files? Did this discovery result in any changes to how people can contribute to the project?

discuss

order

No comments yet.