
GitHub Security Lab
@GHSecurityLab
GitHub Security Lab’s mission is to inspire and enable the community to secure the open source software we all depend on.
Może Ci się spodobać
Find the GitHub Security Lab now on LinkedIn, Mastodon and Bluesky! 👇
GHSL-2024-323: Denial of Service (DoS) in snapcraft securitylab.github.com/advisories/GHS…
GHSL-2024-296: Deserialization of untrusted data in Kykms securitylab.github.com/advisories/GHS…
GHSL-2024-273: ReDoS in remove_html_tags of Gradio securitylab.github.com/advisories/GHS…
Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵

GHSL-2024-327: Poisoned Pipeline Execution (PPE) in Microsoft FluentUI securitylab.github.com/advisories/GHS…
GHSL-2024-254: Poisoned Pipeline Execution (PPE) in Amplification leading to potential acccount takeover securitylab.github.com/advisories/GHS…
How to secure your GitHub Actions workflows with CodeQL. Dive into this actionable supply chain security research from @pwntester . This work resulted in dozens of high impact supply chain findings and, most importantly, added CodeQL support for your GitHub workflows!…

Ever wanted to learn fuzzing?!?! 🐛 Me and some other folks at @pbrucla recently ran a project where we taught folks about the basics of fuzzing with Honggfuzz. 👀 Some fun activities inspired by the Fuzzing101 repo from the folks at @GHSecurityLab! 🤗 github.com/pbrucla/fuzzin…
GHSL-2024-303: Code execution in trusted context via a GitHub Action of Tribler securitylab.github.com/advisories/GHS…
GHSL-2024-173: Environment Variable injection in a Feign GitHub Actions workflow securitylab.github.com/advisories/GHS…
🎉 Excited to announce the launch of CodeQL Community Packs for Security teams and researchers! 🚀 Supercharge your code analysis with new Query, Model, and Library packs, to find more vulnerabilities, accelerate codebases audit, and secure code effortlessly.…
GHSL-2024-091_GHSL-2024-092: DNS rebinding attacks against Home-gallery - CVE-2024-53275, CVE-2024-53276 securitylab.github.com/advisories/GHS…
GHSL-2024-075_GHSL-2024-076: Stored Cross-Site Scripting (XSS) and Remote Code Execution (RCE) via Velocity Template Evaluation in Sonatype Nexus 2 securitylab.github.com/advisories/GHS…
GHSL-2024-072_GHSL-2024-074: Stored Cross-Site Scripting (XSS), Arbitrary File Upload, and Arbitrary File Read/Write via Path Traversal in Reposilite - CVE-2024-36115, CVE-2024-36116, CVE-2024-36117 securitylab.github.com/advisories/GHS…
A new free tier of GitHub Copilot in @code. ✅ 2,000 code completions per month 💬 50 chat messages per month 💫 Models like Claude 3.5 Sonnet or GPT-4o ♥️ More fun for you Check it out today! Oh yeah, and we passed 150M developers on GitHub 💅 github.blog/news-insights/…
🎉 You can now enable code scanning in your GitHub Actions workflow files! ✅ By opting-in to this feature, you can enhance the security of repositories using GitHub Actions. github.blog/changelog/2024…
United States Trendy
- 1. Happy Birthday Charlie 19.9K posts
- 2. Good Tuesday 21.4K posts
- 3. #Worlds2025 22.4K posts
- 4. Bears 90.8K posts
- 5. Caleb 50.3K posts
- 6. Snell 25.5K posts
- 7. Jake Moody 14.4K posts
- 8. Joji 34.6K posts
- 9. Jayden 23.3K posts
- 10. Commanders 53K posts
- 11. Pentagon 66.7K posts
- 12. Swift 289K posts
- 13. Blinken 25K posts
- 14. #BearDown 2,466 posts
- 15. Conquered 29K posts
- 16. Ben Johnson 4,586 posts
- 17. Roki 6,068 posts
- 18. Benin 85.4K posts
- 19. Sewing 6,899 posts
- 20. Turang 4,475 posts
Może Ci się spodobać
-
Google VRP (Google Bug Hunters)
@GoogleVRP -
PortSwigger Research
@PortSwiggerRes -
publiclyDisclosed
@disclosedh1 -
Trend Zero Day Initiative
@thezdi -
Burp Suite
@Burp_Suite -
GitHub Security
@GitHubSecurity -
James Kettle
@albinowax -
PortSwigger
@PortSwigger -
ProjectDiscovery
@pdiscoveryio -
Orange Tsai 🍊
@orange_8361 -
sakura
@eternalsakura13 -
LiveOverflow 🔴
@LiveOverflow -
Suraj
@PwnFunction -
payloadartist
@payloadartist -
Maddie Stone
@maddiestone
Something went wrong.
Something went wrong.