TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Zizmor would have caught the Ultralytics workflow vulnerability

81 pointsby campuscodi5 months ago

5 comments

tigereyeTO5 months ago
This post has left me wondering: what is zizmor? What is ultralytics? Are these words actually real or is someone having a stroke?<p>Not all nerds know all projects so I decided to educate myself and followed OP’s links to learn about Ultralytics:<p>&gt; Ultralytics YOLO11 is a cutting-edge, state-of-the-art (SOTA) model that builds upon the success of previous YOLO versions and introduces new features and improvements to further boost performance and flexibility.<p>Ultralytics’ readme doesn’t explain what ultralytics is or does. Thankfully Zizmor’s readme describes itself clearly:<p>&gt; zizmor is a static analysis tool for GitHub Actions. It can find many common security issues in typical GitHub Actions CI&#x2F;CD setups.<p>This isn’t a critique on OP: I enjoyed reading about the vulnerability(ies!) you found and I learned a lot. I’m just generally frustrated that so many readme files on GitHub fail to describe what the project actually does, Ultralytics being just one example.<p>Have fun and keep hacking
评论 #42361387 未加载
评论 #42361548 未加载
评论 #42408218 未加载
woodruffw5 months ago
(Author of this post.)<p>If you’re interested in how this went down, the timeline section[1] in particular is worth jumping to: my key takeaway is that this vulnerability was <i>reintroduced</i>, and that there’s only limited evidence that the Ultralytics team have done a full revocation and rotation of all accounts and credentials that the attacker may have had access to.<p>Given that, it’s not inconceivable that a third round of backdoored packages will occur. I would recommend that people exercise extreme caution when installing the current versions; most users would probably be best served by pinning to an older version from before any indicators of compromise.<p>[1]: <a href="https:&#x2F;&#x2F;blog.yossarian.net&#x2F;2024&#x2F;12&#x2F;06&#x2F;zizmor-ultralytics-injection#appendix-rough-timeline-of-events" rel="nofollow">https:&#x2F;&#x2F;blog.yossarian.net&#x2F;2024&#x2F;12&#x2F;06&#x2F;zizmor-ultralytics-inj...</a>
评论 #42358572 未加载
RainyDayTmrw5 months ago
Why has CI for open-source projects become so difficult to secure? Where did we, collectively, go wrong?<p>I suppose, it&#x27;s probably some combination of: CI is configured in-band in the repo, PRs are potentially untrusted, CI uses the latest state of config on a potentially untrusted branch, we still want CI on untrusted branches, CI needs to run arbitrary code, CI has access to secrets and privileged operations.<p>Maybe it&#x27;s too many degrees-of-freedom creating too much surface area. Maybe we could get by with a much more limited subset, at least by default.<p>I&#x27;ve been doing CI stuff in my last two day jobs. In contrast, we worked only on private repos with private collaborators, and we explicitly designated CI as trusted.
评论 #42361813 未加载
评论 #42362076 未加载
评论 #42408314 未加载
评论 #42367882 未加载
HeWhoLurksLate5 months ago
Wow, I had no clue about how many ways it was possible to get burned with Actions - as an ME nerd, I&#x27;ve set up a few CI&#x2F;CD workflows, and if I recall correctly, while I was reading through the documentation for GitHub Actions (circa 2022) there wasn&#x27;t any mention of cybersecurity best practices in the general docs. Is that generally considered best practice, or at least acceptable?<p>I&#x27;m not a programmer by trade- I generally write one-off or two-off code, but that&#x27;s changing as I get deeper into simulation land. For me, reading the entirety of the docs is something that generally happens only when I&#x27;m troubleshooting something or an LLM dragged me significantly further than my understanding and I have to go learn how a library or API works.
throw48472855 months ago
Thank you Doctor Zizmor!
评论 #42359956 未加载