(no title)
gz09
|
6 months ago
Correct me if I'm wrong, but the problem here is not with GitHub Apps, instead CodeRabbit violated the principle of least privilege: ideally the private key of their app should never end up in the environment of a job for a client but rather a short lived token should be minted from it (for just a single repo (for which the job is running)) so it never gets anywhere near those areas where one of their clients has any influence over what runs.
mook|6 months ago
billbrown|6 months ago
They should really mass revoke that privilege because I can't see any upside to it. Unless they have a plan for some future state where they will want write access?
sgc|6 months ago
filleokus|6 months ago
But at the same time, me as a customer of Github, would prefer if Github made it harder for vendors like CodeRabbit to make misstakes like this.
If you have an app with access to more than 1M repos, it would make sense for Github to require a short lived token to access a given repository and only allow the "master" private key to update the app info or whatever.
And/or maybe design mechanisms that only allow minting of these tokens for the repo whenever a certain action is run (i.e not arbitrarily).
But at the end of the day, yes, it's impossible for Github to both allow users to grant full access to whatever app and at the same time ensure stuff like this doesn't happen.
lukevp|6 months ago
0x457|6 months ago
I'd rather GitHub finally fix their registry to allow these GH Apps to push/pull with that instead of PAT.
paulddraper|6 months ago
There is a master private key that mints expiring limited-use tokens.
The problem was leaking the master private key.