TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Securing a GitHub repo is a ton of work

57 pointsby the_jesus_villaover 2 years ago

9 comments

xandre_maxwellover 2 years ago
A significantly complex Github repo with CI, complex permissions, Git hooks all over, is pretty much its own software system that you have to manage, just like server management via Ansible or what-have-you.<p>Github does a great job at implementing sane defaults but I understand the author&#x27;s point - there can be a lot to do and you usually don&#x27;t know you&#x27;re even supposed to worry about this until way later when security auditors file like 9001 reports about your repo settings.
评论 #33284805 未加载
评论 #33284788 未加载
necovekover 2 years ago
Many of these have nothing to do with Git or GitHub in particular (dependabot, storing live credentials in the codebase...).<p>It&#x27;d be nicer if you managed to focus on the part of the Git&#x2F;GitHub story: though, as a rant, it&#x27;s perfectly fine :)
bomboloover 2 years ago
&gt; A crap link is one that&#x27;s only superficially interesting. Stories on HN don&#x27;t have to be about hacking, because good hackers aren&#x27;t only interested in hacking, but they do have to be deeply interesting.<p>I&#x27;d say this link violates the rules. It says absolutely nothing new, it is shallow, has a popup.
Ayeshover 2 years ago
GitHub does a pretty good job requiring oauth or ssh key authentication, and the new finely-grained personal access are awesome, I just switched all my apps to use more locked down PATs.<p>The far you reach from GitHub&#x27;s ecosystem, that&#x27;s where most of the vulnerabilities are.<p>Repo-specific deploy keys, read-only keys and branch protection are my &quot;pro&quot; security hardening steps.<p>Shoving all secrets in ENV isn&#x27;t a clear improvement either. Sure, most CI services attempt to mask them, but it&#x27;s trivially to extract the secrets. For GitHub, you have to approve incoming first-time PRs, but it&#x27;s a huge vector someone determined can exploit.
the_jesus_villaover 2 years ago
More of a rant than anything. I spend a lot of time doing this and there are so many little things you <i>could</i> harden a little bit.<p>Kind of a rabbithole of energy!
yositoover 2 years ago
TL;DR turn on signed commits and 2FA, don&#x27;t commit secrets, and be careful with dependency vulnerabilities.<p>Doesn&#x27;t really seem like &quot;a ton of work&quot;.
评论 #33284927 未加载
评论 #33284943 未加载
newman314over 2 years ago
I&#x27;ve found StepSecurity&#x27;s tooling helpful in getting my repos locked down.<p>* <a href="https:&#x2F;&#x2F;app.stepsecurity.io&#x2F;securerepo" rel="nofollow">https:&#x2F;&#x2F;app.stepsecurity.io&#x2F;securerepo</a> * <a href="https:&#x2F;&#x2F;app.stepsecurity.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;app.stepsecurity.io&#x2F;</a><p>It also helps to go through the GitHub options to lock things down. Also, configure Dependabot to update &quot;github-actions&quot;<p>No affiliation. Just a happy user.
stoplying1over 2 years ago
Not really. Just another substack think piece.<p>Complete with the living modal upsell popup ala Medium. Will people ever learn? (No, no they won&#x27;t)
评论 #33284965 未加载
dubyabee2over 2 years ago
eeyup, Witness!