top | item 44503945

(no title)

gitfan86 | 7 months ago

This seems easy for GitHub to block

discuss

order

kragen|7 months ago

It's not sufficient for GitHub to block it; plenty of Git repositories don't have anything to do with GitHub.

dgl|7 months ago

Submodules can be any URL (and recursive), so for GitHub to block this totally would require them to crawl other forges (and some URLs could be private URLs, but GitHub likely can't tell that apart from an attacker who is just blocking GitHub). So the risk is GitHub could say they are blocking this and give a false sense of security.

Some previous bugs have resulted in validation added to git fsck, but because clone URLs can't change after the submodules are initialised that's not going to have any benefit here. (There were some defence-in-depth measures discussed, there's definitely a few things that can be improved here.)

gitfan86|7 months ago

You can always find edge cases in security. Someone somewhere is running Internet Explorer 10 but that doesn't mean Chrome fixing bugs doesn't dramatically reduce effectiveness of attacks