Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If that action is "./run_tests.sh", which is a top use case, the attacker just changes "./run_tests.sh", so while I agree that's useful, it doesn't secure the typical case, and makes for a hard cost/value stance.

The threat models are probably more like 1. "make sure only the right people run actions" and separately, 2. "make sure authorized events/actions only use the expected capabilities." Both largely fail today.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: