Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding a rule to detect impostor commits #13

Open
bboilot-ledger opened this issue Oct 30, 2024 · 3 comments
Open

Adding a rule to detect impostor commits #13

bboilot-ledger opened this issue Oct 30, 2024 · 3 comments

Comments

@bboilot-ledger
Copy link
Contributor

Hello @hugo-syn 👋

I recently came across https://openssf.org/blog/2024/08/12/mitigating-attack-vectors-in-github-workflows/
From a defensive aspect, it would be awesome to be able to detect impostor commit used in github actions using octoscan.

But this is more an indicator of compromise rather than a vulnerability. What do you think about adding this kind of rule?

@hugo-syn
Copy link
Collaborator

Hi @bboilot-ledger, what do you imagine ? An alert when a commit is not pinned ? Or an alert if the commit doesn't belong to the main project ?

Did you try their action https://github.com/ossf/scorecard-action ? I think there is a rule for non pinned commits but I don't know if they can detect impostor commit.

Since it's a defensive rule I don't know if I want to add this

@bboilot-ledger
Copy link
Contributor Author

I imagined an alert if the pinned commit belongs to a fork of the action repository.

There is also https://woodruffw.github.io/zizmor/audits/#impostor-commit that is able to detect impostor commits.

Yes, this is definitely a defensive rule, so out of scope of this tool.

Thanks for your feedback, I guess we can close this issue.

@hugo-syn
Copy link
Collaborator

hugo-syn commented Nov 2, 2024

Well after some discussion with a colleague I changed my mind I'll try to implement this rule, I'll update this issue once done

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants