top | item 46263242

(no title)

robinhoodexe | 2 months ago

Wouldn’t the IP allowlist feature on the GitHub organisation work wonders for this kind of attack?

discuss

order

moh_quz|2 months ago

That definitely helps, but I don't think it solves the compromised machine scenario.

If the attacker has shell access to the dev's laptop, they are likely just running commands directly from that machine (or proxying through it). So to GitHub, the traffic still looks like it's coming from the allowed IP.

Allowlists are mostly for stopping usage of a token that got stolen and taken off-device.