Skip to content

Commit 8bee447

Browse files
authored
feat: Document GitHub fork commit spoofing risks
Added section on GitHub fork commit reachability and metadata spoofing, explaining potential security risks and how an attacker can forge commits.
1 parent 017db0b commit 8bee447

1 file changed

Lines changed: 14 additions & 0 deletions

File tree

Cloud.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -881,3 +881,17 @@ done
881881

882882
echo "Results saved to $RESULTS_DIR/"
883883
```
884+
885+
## GitHub Fork Commit Reachability & Metadata Spoofing
886+
887+
GitHub's architecture makes any commit pushed to a fork reachable by SHA from the parent repository — `victim/repo/commit/<SHA>` resolves even if the commit only exists in `attacker/repo`. Combined with Git's unauthenticated author/committer fields, an attacker can forge commits that appear to originate from trusted automation like Renovate bot, reference them under the parent repo's namespace, and exploit the GitHub UI's lack of fork attribution to lend credibility in social engineering or supply chain attacks.
888+
889+
```bash
890+
GIT_AUTHOR_NAME="renovate[bot]" \
891+
GIT_AUTHOR_EMAIL="29139614+renovate[bot]@users.noreply.github.com" \
892+
GIT_AUTHOR_DATE="Wed Apr 1 18:51:43 2026 +0000" \
893+
GIT_COMMITTER_NAME="GitHub" \
894+
GIT_COMMITTER_EMAIL="noreply@github.com" \
895+
GIT_COMMITTER_DATE="Wed Apr 1 18:51:43 2026 +0000" \
896+
git commit --no-gpg-sign -m "fix(deps): update module golang.org/x/text to v0.35.0"
897+
```

0 commit comments

Comments
 (0)