TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How to avoid leaking your customer's source code with GitHub apps

50 点作者 grinnick超过 3 年前

3 条评论

eranation超过 3 年前
Good article and agree with the recommendations, I&#x27;m trying to understand the attack flow though. You perform an actual installation and get a valid authorization code, but replace the actual installation ID with another (that the user has no access to)?<p>This is a major issue then from GitHub&#x27;s side. I think what GitHub should do is just like with Oauth apps, allow you to provide a state (assuming the flow is starting from the SaaS app, not from the GitHub marketplace, I assume you can&#x27;t send a state since it&#x27;s sort of like an &quot;IdP initiated&quot; flow in case you start the installation from the github marketplace, but they should let you opt out and require a state. There is a reason why things like PKCE and such exist.
评论 #29101563 未加载
fortran77超过 3 年前
One reason we use Amazon&#x27;s &quot;Code Commit&quot; over any github project is there&#x27;s no possibility we can click the wrong setting and make our code public.
netr0ute超过 3 年前
The real fix? Make all of their software open source.
评论 #29101326 未加载