• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

GitHub Now Supports Private Vulnerability Reporting For Public Repositories

You are here: Home / General Cyber Security News / GitHub Now Supports Private Vulnerability Reporting For Public Repositories
November 14, 2022

Code hosting organization GitHub has unveiled a new direct channel for security researchers to report vulnerabilities in community repositories.

The characteristic requires to be manually enabled by repository maintainers and, when lively, enables security scientists to report any vulnerabilities identified in their code.

“Owners and administrators of public repositories can allow security scientists to report vulnerabilities securely in the repository by enabling non-public vulnerability reporting,” the Microsoft-owned system wrote in a the latest website put up.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


According to the enterprise, security scientists often truly feel responsible for alerting users to a vulnerability that could be exploited.

However, in the absence of distinct recommendations about getting in contact with maintainers of the repository that contains the vulnerability, researchers could have to disclose the vulnerability on social media or ship immediate messages to the maintainer, which could lead to community disclosure of the flaw information.

“The default actions in GitHub to reporting issues is making use of the issues functionality (or likely a git ask for),” explained John Bambenek, principal risk hunter at Netenrich, referring to the previous procedure of disclosing vulnerabilities on GitHub.

“Both are community, which makes it possible for attackers to know there is a trouble, and they can use the age of the preliminary report to further more notify their concentrating on,” Bambenek explained to Infosecurity. “Attackers however have the window among when a patch is accessible and when it is universally applied. We do not will need to give them even extra time.”

The new element has consequently been designed to make it much easier for security researchers to report vulnerabilities directly applying a easy kind.

“Full props to Github listed here, not just for creating a workflow to aid vulnerability disclosure, but additional importantly, for normalizing the worth of security comments from the outdoors world for F/OSS maintainers and developers,” claimed Casey Ellis, founder and CTO at Bugcrowd.

On receiving a vulnerability notify, security researchers can accept it, ask extra concerns or reject it. Really should they make a decision to settle for it, they will then be in a position to collaborate with the unique who found the vulnerability.

The personal vulnerability reporting capability will come months right after Checkmarx found out a flaw in GitHub that could have reportedly enabled attackers to take command of repositories and spread malware to relevant applications and code.


Some components of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News NSA Guide Helps Firms Protect Against Memory Safety Vulnerabilities
Next Post: Google to Pay $391 Million Privacy Fine for Secretly Tracking Users’ Location Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.