GHSecurityLab Profile Banner
GitHub Security Lab Profile
GitHub Security Lab

@GHSecurityLab

Followers
26K
Following
191
Media
215
Statuses
1K

GitHub Security Lab’s mission is to inspire and enable the community to secure the open source software we all depend on.

Joined October 2019
Don't wanna be here? Send us removal request.
@GHSecurityLab
GitHub Security Lab
10 months
Find the GitHub Security Lab now on LinkedIn, Mastodon and Bluesky! 👇
7
5
8
@GHSecurityLab
GitHub Security Lab
10 months
Bluesky:
1
2
4
@GHSecurityLab
GitHub Security Lab
11 months
GHSL-2024-323: Denial of Service (DoS) in snapcraft
Tweet card summary image
securitylab.github.com
A snap with a crafted yaml file can cause a Denial of Service (DoS) in snapcraft.
5
4
5
@GHSecurityLab
GitHub Security Lab
11 months
GHSL-2024-273: ReDoS in remove_html_tags of Gradio
Tweet card summary image
securitylab.github.com
remove_html_tags uses a regex that has a ReDoS vulnerability.
0
0
8
@artsploit
Michael Stepankin
11 months
Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵
7
82
300
@GHSecurityLab
GitHub Security Lab
11 months
GHSL-2024-327: Poisoned Pipeline Execution (PPE) in Microsoft FluentUI
Tweet card summary image
securitylab.github.com
The pr-website-deploy-comment workflow of Microsoft FluentUI is vulnerable to Poisoned Pipeline Execution (PPE).
1
1
8
@GHSecurityLab
GitHub Security Lab
11 months
GHSL-2024-254: Poisoned Pipeline Execution (PPE) in Amplification leading to potential acccount takeover
Tweet card summary image
securitylab.github.com
Amplification is vulnerable to Poisoned Pipeline Execution (PPE) allowing malicious actors to take over the repository.
0
3
11
@GHSecurityLab
GitHub Security Lab
11 months
How to secure your GitHub Actions workflows with CodeQL. Dive into this actionable supply chain security research from @pwntester . This work resulted in dozens of high impact supply chain findings and, most importantly, added CodeQL support for your GitHub workflows!
6
15
54
@bliutech
Benson Liu
1 year
Ever wanted to learn fuzzing?!?! 🐛 Me and some other folks at @pbrucla recently ran a project where we taught folks about the basics of fuzzing with Honggfuzz. 👀 Some fun activities inspired by the Fuzzing101 repo from the folks at @GHSecurityLab! 🤗 https://t.co/dsz35EeNCd
Tweet card summary image
github.com
🐛 UCLA ACM Cyber's Fuzzing Lab. Contribute to pbrucla/fuzzing-lab development by creating an account on GitHub.
3
54
246
@GHSecurityLab
GitHub Security Lab
11 months
GHSL-2024-303: Code execution in trusted context via a GitHub Action of Tribler
Tweet card summary image
securitylab.github.com
Checking out of untrusted branch allows code execution in trusted context in the pr-comment-validate Action
0
1
9
@GHSecurityLab
GitHub Security Lab
1 year
GHSL-2024-173: Environment Variable injection in a Feign GitHub Actions workflow
Tweet card summary image
securitylab.github.com
Feign’s comment-pr.yml workflow is vulnerable to Environment Variable injection which may lead to Repository takeover.
0
1
6
@GHSecurityLab
GitHub Security Lab
1 year
🎉 Excited to announce the launch of CodeQL Community Packs for Security teams and researchers! 🚀 Supercharge your code analysis with new Query, Model, and Library packs, to find more vulnerabilities, accelerate codebases audit, and secure code effortlessly.
Tweet card summary image
github.blog
We are excited to introduce the new CodeQL Community Packs, a comprehensive set of queries and models designed to enhance your code analysis capabilities. These packs are tailored to augment…
1
12
38
@GHSecurityLab
GitHub Security Lab
1 year
GHSL-2024-075_GHSL-2024-076: Stored Cross-Site Scripting (XSS) and Remote Code Execution (RCE) via Velocity Template Evaluation in Sonatype Nexus 2 https://t.co/aR1KzahTY3
Tweet card summary image
securitylab.github.com
Sonatype Nexus 2 is affected by multiple high severity vulnerabilities, including Stored Cross-Site Scripting (XSS) and Remote Code Execution (RCE) via Velocity Template Evaluation.
0
1
11
@GHSecurityLab
GitHub Security Lab
1 year
GHSL-2024-072_GHSL-2024-074: Stored Cross-Site Scripting (XSS), Arbitrary File Upload, and Arbitrary File Read/Write via Path Traversal in Reposilite - CVE-2024-36115, CVE-2024-36116, CVE-2024-36117 https://t.co/xveXbWOb7f
Tweet card summary image
securitylab.github.com
Reposilite is affected by multiple high severity vulnerabilities, including Stored Cross-Site Scripting (XSS) allowing unauthenticated users to steal the victim’s password from the browser’s local...
0
1
4
@github
GitHub
1 year
A new free tier of GitHub Copilot in @code. ✅ 2,000 code completions per month 💬 50 chat messages per month 💫 Models like Claude 3.5 Sonnet or GPT-4o ♥️ More fun for you Check it out today! Oh yeah, and we passed 150M developers on GitHub 💅
Tweet card summary image
github.blog
Come and join 150M developers on GitHub that can now code with Copilot for free in VS Code.
109
627
3K
@GHSecurityLab
GitHub Security Lab
1 year
🎉 You can now enable code scanning in your GitHub Actions workflow files! ✅ By opting-in to this feature, you can enhance the security of repositories using GitHub Actions. https://t.co/542bHeot0b
Tweet card summary image
github.blog
You can now enable code scanning in your GitHub Actions workflow files. By opting-in to this feature, you can enhance the security of repositories using GitHub Actions. Actions analysis support…
0
7
18