TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Protecting Mozilla’s GitHub Repositories from Malicious Modification

152 pointsby jvehentover 6 years ago

2 comments

Boulthover 6 years ago
&gt; Production branches should be identified and configured:<p>&gt; ...<p>&gt; Require all commits to be GPG signed, using keys known in advance.<p>Is it possible to configure &quot;all commits gpg signed&quot; on Github? I haven&#x27;t seen this option.<p>Another interesting thing that Github lacks is signed git pushes (`gpg push --signed`) that allows audit logging who moved which object to which ref.
评论 #17986262 未加载
评论 #17986445 未加载
throw28363over 6 years ago
It is a shame that a lot of critical projects (including compilers, browsers...) still try to do things a la CVS&#x2F;SVN (even if they use a DVCS).<p>Please, stop it. Do it the way the kernel does it. A hierarchy of maintainers that reviews the work sent by others and a single person with commit access to the main repository.<p>I am amazed that these smart people have not realizead yet that unrestricted commit access is simpy a no-go, with or without signed commits&#x2F;tags.
评论 #17986403 未加载
评论 #17986627 未加载
评论 #17988965 未加载
评论 #17986874 未加载
评论 #17986645 未加载
评论 #17987068 未加载