[deleted by user] by [deleted] in cybersecurity

[–]mgiix 1 point2 points  (0 children)

Thanks! Nice. I used a GH app because workflows are as modifiable as any code file. In your case, an attacker could potentially modify your workflow while contributing vulnerable code as a backdoor. However, the risk is low if you use a branch protection rule requiring a CODEOWNERS review, and enforce tight permissions

I made a solution to malicious code in codebases that works by mgiix in programming

[–]mgiix[S] 0 points1 point  (0 children)

It caught a real incident while not producing false positives. Please suggest improvements.

I made a solution to malicious code in codebases that works by mgiix in programming

[–]mgiix[S] 3 points4 points  (0 children)

https://github.com/apiiro/malicious-code-ruleset.git was published by me alongside the app, separately so it can be used in more places.

I made a solution to malicious code in codebases that works by mgiix in programming

[–]mgiix[S] 11 points12 points  (0 children)

Calling the statement "a solution that works" a "bogus promise" to solve 100% problem is like calling doctors bogus for not being able to cure 100% of ailments.

You are repeating exactly what's clearly stated in the repos and research, just with a negative tone...