Zum Inhalt der Seite gehen


If there was malicious code in a legitimate project hosted on #codeberg, would we remove access to it, including for security researchers?

Short: No!

We are considering how to prevent fetching malicious code by accident, though.

In any case, we are open to collaborating with security researchers. Interested? Help us build a malware hunting team: codeberg.org/Codeberg/Contribu…

Background: #GitHub locked access to source code of xz, which was background of active investigation from the community.

Als Antwort auf Codeberg.org

To people looking for an archive of the XZ code, you might want to check out tukaani.org/xz-backdoor/ which links to git.tukaani.org/. GitHub is not the only source of truth, although meta information about the Pull Requests is locked in to this silo.
Als Antwort auf Codeberg.org

Many thanks for your work on openess. It's another proof that git history is not sufficient and we cannot tolerate a locked silo like Github. PR, issues, comments and everything else are an essential part of the repository, the code is not enough.
Als Antwort auf Codeberg.org

One idea I have for preventing accidental fetches of malicious code would be to prevent access through the primary domain, and require the use of a seperate (sub)domain such as [caution.codeberg.org](caution.codeberg.org), or [codeberg-caution.org](codeberg-caution.org). Weither this is done throgh a seperate instance it is cloned to, or via special handeling in the forejo would be up to debate.
Als Antwort auf Codeberg.org

Good question... Maybe prevent direct git access for non-contributors and show a banner on the website (where you could still downlad the repo)? There shiuld also be a system to let the maintainers request to get out of this state to allow automated build systems to build the fixed version.
Als Antwort auf Codeberg.org

@necrosis If you don't want people to fetch malicious code by accident:

* create a branch for security researchers to work on (a tag would actually be sufficient, but branches are even easier in git)
* create a commit on the main branch removing everything except a README.md explaining the situation

Als Antwort auf Codeberg.org

Do you have a process to lock those projects from tampering?
Als Antwort auf waldi

@waldi We don't have a precedence case yet. The easiest option would be to require users to sign in to Codeberg, so they are forced to see a warning and prevent distribution via automation like CI.

However, it requires everyone to create an account to investigate the code, so we are working on a better solution.

Diese Webseite verwendet Cookies. Durch die weitere Benutzung der Webseite stimmst du dieser Verwendung zu. https://inne.city/tos