daniel, to github
@daniel@roe.dev avatar

Going to try to build an AI-powered integration with (+ + ?) to make my life as a maintainer a bit easier.

<rubs hands>

▶️ Streaming now on https://twitch.tv/danielroe

governa, to github
@governa@fosstodon.org avatar
marcel, to github
@marcel@waldvogel.family avatar

Don't trust any random file, just because it lies in a trustworthy project. Because essentially anyone can create files under any project space.

https://www.schneier.com/blog/archives/2024/04/using-legitimate-github-urls-for-malware.html

phranck, to github German
@phranck@chaos.social avatar

What the heck is this repository on ? There are several of them... 🤔

https://github.com/anuragyantra/china-dictatorship

abcdw, to github
@abcdw@fosstodon.org avatar

The nice thing about sourcehut: API is exposed to me to the full extent and I can easily integrate things how I want.

https://man.sr.ht/lists.sr.ht/api.md
https://man.sr.ht/todo.sr.ht/api.md

arda, to github
@arda@micro.arda.pw avatar

GitLab C̶o̶p̶i̶l̶o̶t̶ 😆 Duo chat is now generally available:

https://about.gitlab.com/gitlab-duo/

Wuzzy, to Software
@Wuzzy@cyberplace.social avatar

After the attack, I have a suggestion for all forges (, , , , etc.):
Have some way to visualize binary files better, including diffs to such files. Cuz now, we have basically nothing except byte counters.
Since they're binary files, it must be as generic as possible. But even some rendering or analysis is better than nothing.

The idea is to expose weird patterns in binary files that could be a sign of an attack.

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

: "A GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using URLs associated with a Microsoft repository, making the files appear trustworthy.

While most of the malware activity has been based around the Microsoft GitHub URLs, this "flaw" could be abused with any public repository on GitHub, allowing threat actors to create very convincing lures.

Yesterday, McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft GitHub repository for the "C++ Library Manager for Windows, Linux, and MacOS," known as vcpkg.

The URLs for the malware installers, shown below, clearly indicate that they belong to the Microsoft repo, but we could not find any reference to the files in the project's source code." https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-repo-urls/

ifiinlist, to github
@ifiinlist@mastodon.social avatar
veronica, to programming
@veronica@mastodon.online avatar

I think I may be spending too much time pushing code. This is my GitHub contrib overview. None of this is for work. We use GitLab there.

There was a 3 week gap in July last year, when I had my vacation, and a 2 week gap in October when I had COVID.

Maybe I should have more breaks. 😅

mikeymikey, to random
@mikeymikey@hachyderm.io avatar

holy hell Github - this is bad

heads up repo maintainers on Github - you may want to disable interactions for now

The last thing any OSS maintainer needs is their project getting a strike because some bad actor chose their repo 😤

https://infosec.exchange/@BleepingComputer/112303968938875475

winterschon,
@winterschon@hachyderm.io avatar

@mikeymikey oh look, MSFT being a problem for FOSS communities? never! lol 💁🏼‍♀️🤭🤣

Maybe one day people will realize that MSFT has always been a problem and will always be a problem. Closed Source has its place, but the way MS behaves is a direct causal link to CVEs and threat actors causing instability and security crises.

oh... did FOSS also warn everyone that MS buying Github was a terrible mistake, yes.

83r71n, to Cybersecurity
@83r71n@ioc.exchange avatar

A critical vulnerability, identified as CVE-2024-20356, has been found in Cisco's Integrated Management Controller (IMC). This flaw allows for command injection, potentially giving attackers the ability to gain root access to systems. The vulnerability is located in the web-based management interface of the IMC, which is used for remotely managing Cisco hardware. The issue arises from insufficient user input validation in the IMC interface, allowing an authenticated, remote attacker with administrative privileges to inject malicious commands.

Security researchers from Nettitude have developed a Proof of Concept (PoC) exploit, named "CISCown," to demonstrate this vulnerability. The exploit involves sending crafted commands through the web interface, enabling attackers to execute arbitrary code with root privileges on the underlying operating system of Cisco hardware. This PoC exploit is part of a toolkit developed by Nettitude and is available on GitHub. It uses parameters such as target IP, username, and password to automate the exploitation process and deploy a telnetd root shell service on compromised devices.

The release of this PoC exploit signifies a critical threat level for organizations using affected Cisco products. Gaining root access can lead to data theft, system downtime, and further network compromise. Cisco has responded by releasing software updates to address this vulnerability. It is strongly recommended that all affected organizations apply these updates immediately, as no known workaround mitigates this vulnerability.

The affected products include a range of Cisco servers and computing systems, such as the 5000 Series Enterprise Network Compute Systems (ENCS), Catalyst 8300 Series Edge uCPE, UCS C-Series M5, M6, and M7 Rack Servers in standalone mode, UCS E-Series Servers, and UCS S-Series Storage Servers. Users and administrators are advised to visit Cisco’s official security advisory page and the Nettitude GitHub repository hosting the exploitation toolkit for more detailed information and access to the updates.

https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/

#cybersecurity #cisco #vulnerability #imc #cve #poc #nettitude #encs #ucpe #ucs #m5 #m6 #m7 #github

SylvieLorxu, to github
@SylvieLorxu@chaos.social avatar

Catima 2.29.0 is out!

This release adds support for finding barcodes in PDF files[1] and dealing with multiple barcodes. It also properly colours the status bar during usage now.

As always, it's available on #GitHub, will soon be available on #IzzyOnDroid and will slowly roll out to other app stores.

https://github.com/CatimaLoyalty/Android/releases/tag/v2.29.0

[1] Not sandboxed yet, help welcome in https://github.com/CatimaLoyalty/Android/issues/1804

#Catima #OpenSource #Android

davidbisset, to github
@davidbisset@phpc.social avatar

Identifying WordPressers on GitHub... WordPressers on browser extension.

https://pascalbirchler.com/wordpressers-on-github/

Polynomial_C, to github Catalan
@Polynomial_C@mastodon.social avatar

Visualization and sonification of the #github commit history of the #arduino repository.

video/mp4

arda, to opensource
@arda@micro.arda.pw avatar

Part-DB:

Part-DB is an Open source inventory management system for your electronic components

https://docs.part-db.de

https://github.com/Part-DB/Part-DB-server

-db

paigerduty, (edited ) to tech
@paigerduty@hachyderm.io avatar

Do you remember your first pull request? What was it?

[also... are PRs just a Github/git thing??]

paigerduty,
@paigerduty@hachyderm.io avatar

Mine was back at New Relic when I was in PeopleOps and our engineering employee handbook was hosted on

I submitted one to update policy language and the devs were so supportive lots of fun emojis and comments on the PR 🎉

phryk, to random
@phryk@mastodon.social avatar

A friend got frustrated with gitlab today because the @efoundation gitlab denies registrations from their personal mailserver, probably
caused by this thing:

https://about.gitlab.com/blog/2021/08/19/introducing-spamcheck-data-driven-anti-abuse/

I could reproduce the issue (see screenshot) and then we stumbled onto this:

https://about.gitlab.com/

Some money quotes:

"GitLab is the most comprehensive AI-powered DevSecOps Platform."

"See how Lockheed Martin saves time, money, and tech muscle with GitLab"

phryk,
@phryk@mastodon.social avatar

For context: Lockheed Martin is one of the biggest US arms manufacturers, building things like fighter jets and ballistic missiles.

I think it's fair to say that by now should be seen as just as morally bankrupt as Microsoft .

wervice, to github
@wervice@fosstodon.org avatar

How does your current project's language graph look?

sergio_101, to mastodon
@sergio_101@mastodon.social avatar

Is there a standard public forum that people to for help in setting up their instances? I found the one, but I am not really finding any other forums.

Thanks!

stvfrnzl, to tidal
@stvfrnzl@mastodon.online avatar

After publishing my latest article, I forwarded it to and let them know regarding the issues I found during my research.

Got an answer and it turns out that they're slowly open-sourcing their codebase and I can start a discussion in their repository:

https://github.com/orgs/tidal-music/discussions/55

First time I ever did that, looking forward to see if sticks and they care about it. 🤞

nicomen, to github Norwegian Bokmål
@nicomen@oslo.town avatar

So what do we use instead of ?

stevensanderson, to github
@stevensanderson@mstdn.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • cubers
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • osvaldo12
  • ngwrru68w68
  • GTA5RPClips
  • provamag3
  • InstantRegret
  • everett
  • Durango
  • cisconetworking
  • khanakhh
  • ethstaker
  • tester
  • anitta
  • Leos
  • normalnudes
  • modclub
  • megavids
  • lostlight
  • All magazines