Github action security hardening post-Ultralytics #130
Replies: 3 comments 11 replies
-
cc: @django-commons/admins @django-commons/security-team |
Beta Was this translation helpful? Give feedback.
-
Thanks, I didn't know about this incident. I'm not 100% sure what 1) would imply or if it would help or if it would restrict what people can do in django-commons. That said, if there's an easy way to enforce this and if we have a lightweight process around extending the allowlist I'd be fine with that.
|
Beta Was this translation helpful? Give feedback.
-
Yikes, CI injection by git branch name has me 🤯
No, I think maintaining a allow list would be too much work and be too annoying to maintainers.
Yes!
Yes, but see below.
If its fast enough! I think we should strive for the confidence that a django-commons project is less vulnerable to a supply chain attack. I think this unfortunately necessitates a more active role for the security team because part of this story has to be offloading a little bit of work from maintainers. The good news is that I think there's a lot of low hanging fruit we can automate. I propose the following:
Doing it this way means that once your repo is onboarded at least you and the security team will automatically be apprised of any zizmor findings. No need to do per-repository work to add CI/CD scanning. I'd also imagine GitHub is going to incorporate CI/CD scanning into its security portfolio at some point at which point we can probably just adjust the security policy to say that must be enabled. I'd be happy to take a stab at this if ya'll think its a good idea. |
Beta Was this translation helpful? Give feedback.
-
Hi all,
I was reading this update on the Ultralytics incident (https://blog.yossarian.net/2024/12/06/zizmor-ultralytics-injection) and I had a few thoughts/questions:
This exploit confirms our organization fits the profile of a target since it is designed around github actions and transparency.
Beta Was this translation helpful? Give feedback.
All reactions