TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How to avoid leaking your customer's source code with GitHub apps

50 pointsby grinnickover 3 years ago

3 comments

eranationover 3 years ago
Good article and agree with the recommendations, I&#x27;m trying to understand the attack flow though. You perform an actual installation and get a valid authorization code, but replace the actual installation ID with another (that the user has no access to)?<p>This is a major issue then from GitHub&#x27;s side. I think what GitHub should do is just like with Oauth apps, allow you to provide a state (assuming the flow is starting from the SaaS app, not from the GitHub marketplace, I assume you can&#x27;t send a state since it&#x27;s sort of like an &quot;IdP initiated&quot; flow in case you start the installation from the github marketplace, but they should let you opt out and require a state. There is a reason why things like PKCE and such exist.
评论 #29101563 未加载
fortran77over 3 years ago
One reason we use Amazon&#x27;s &quot;Code Commit&quot; over any github project is there&#x27;s no possibility we can click the wrong setting and make our code public.
netr0uteover 3 years ago
The real fix? Make all of their software open source.
评论 #29101326 未加载