Skip to content

Commit

Permalink
Update docs/spec/draft/threats.md
Browse files Browse the repository at this point in the history
Co-authored-by: Tom Hennen <TomHennen@users.noreply.github.com>
Signed-off-by: Zachariah Cox <zachariahcox@github.com>
  • Loading branch information
zachariahcox and TomHennen authored Mar 3, 2025
1 parent ffdba3b commit 307245c
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/spec/draft/threats.md
Original file line number Diff line number Diff line change
Expand Up @@ -110,7 +110,7 @@ A best practice is to require approval of any changes via a change management to

*Example:* Adversary creates a pull request using a secondary account and approves it using their primary account.

Solution: The producer must require strongly authenticated user accounts and ensure that all accounts map to unique persons.
Solution: The producer must require all accounts with 'write' and 'approval' permissions to be strongly authenticated and ensure they map to unique persons.
A common vector for this attack is to take over a robot account with the permission to contribute code.
Control of the robot and an actors own legitimate account is enough to exploit this vulnerability.

Expand Down

0 comments on commit 307245c

Please sign in to comment.