LWN: Comments on "GitHub comments used to distribute malware (BleepingComputer)" https://lwn.net/Articles/971008/ This is a special feed containing comments posted to the individual LWN article titled "GitHub comments used to distribute malware (BleepingComputer)". en-us Thu, 30 Oct 2025 07:50:15 +0000 Thu, 30 Oct 2025 07:50:15 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971430/ https://lwn.net/Articles/971430/ eduperez <div class="FormattedComment"> Yes, it makes sense that the files associated with a comment appear as belonging to the owner of the comment, not the owner of the repo where the comment was made. Also, the files are uploaded and linked even if the comment is abandoned and never posted; another sane measure would be to delete the files if the comment is not posted or gets deleted later.<br> </div> Mon, 29 Apr 2024 07:28:39 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971198/ https://lwn.net/Articles/971198/ srdjant <div class="FormattedComment"> What is interesting, is that this is the same git repo that was mentioned in another LWN article's comments (<a rel="nofollow" href="https://lwn.net/Articles/967866/">https://lwn.net/Articles/967866/</a>) regarding the actions of a specific user that was (probably innocently) suspected of being involved with the XZ attack, because of their actions (being pushy about updating a version to the vulnerable xz version) in an issue for that repo.<br> <p> I would say it's probably just a random co-incidence, but I am not surprised that devs and maintainers are now looking carefully at their own, and other important projects for signs of attack (e.g. the ZSH Plugin Manager video from 8 days ago).<br> </div> Thu, 25 Apr 2024 19:52:54 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971188/ https://lwn.net/Articles/971188/ Heretic_Blacksheep <div class="FormattedComment"> Perhaps don't allow direct links to files that aren't part of the repository itself. Single use hash file ID that is generated each time the file is displayed might be a way to do this without revealing the direct file link. Perhaps I just need to set my disused account to private, if that would fix the problem in as far as I'm concerned. I can't fix Github itself, but I can at least potentially cover my tiny base as well as can be.<br> </div> Thu, 25 Apr 2024 16:24:19 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971183/ https://lwn.net/Articles/971183/ ibukanov <div class="FormattedComment"> The website can check for the referer and similar HTTP headers. If it matches the expected value for a media file accessed through the comment page, then return the file content. If not, then show a banner first asking to go to the comment page.<br> </div> Thu, 25 Apr 2024 16:09:10 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971177/ https://lwn.net/Articles/971177/ wtarreau <div class="FormattedComment"> Yeah I totally agree, and it's way better than my suggestion of a hash!<br> </div> Thu, 25 Apr 2024 15:42:30 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971176/ https://lwn.net/Articles/971176/ wtarreau <div class="FormattedComment"> There are pros and cons there. One difficulty that may arise with only a hash is that if some deployment systems become popular based on this, users will be trained to trust any hash, thus all of them will look legit :-/ Worse, there will be no way to figure where it was posted. At least with a prefix it can help figure some context.<br> </div> Thu, 25 Apr 2024 15:41:20 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971142/ https://lwn.net/Articles/971142/ flussence <div class="FormattedComment"> How would you display a banner on a direct link to a tar/zip file?<br> </div> Thu, 25 Apr 2024 14:45:04 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971101/ https://lwn.net/Articles/971101/ ibukanov <div class="FormattedComment"> GitHub should show a banner with a warning when the files uploaded as a part of comments are accessed outside of the comment page. <br> </div> Thu, 25 Apr 2024 14:02:21 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971092/ https://lwn.net/Articles/971092/ bluss <div class="FormattedComment"> Users can comment on any commit in a github repo, not just in issues and PRs. To turn that off I think you have to go to the 'Limit to repository collaborators' setting for 6 months, it doesn't have an indefinite setting.<br> </div> Thu, 25 Apr 2024 12:43:21 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971091/ https://lwn.net/Articles/971091/ daroc <div class="FormattedComment"> It is in fact possible to disable issues, but only for a limited amount of time. And, of course, it prevents anyone from filing issues, which many projects have a use for.<br> </div> Thu, 25 Apr 2024 12:37:21 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971085/ https://lwn.net/Articles/971085/ sidcha <div class="FormattedComment"> They (attacker) would just use another project that allows comments. <br> </div> Thu, 25 Apr 2024 10:00:26 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971082/ https://lwn.net/Articles/971082/ NAR <div class="FormattedComment"> Exactly, how are they going to upload e.g. a screenshot for a comment? Which is really useful for GUIs...<br> </div> Thu, 25 Apr 2024 09:08:45 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971081/ https://lwn.net/Articles/971081/ Karellen <div class="FormattedComment"> If people can't access the "post a comment" UI for a repo, how are they going to upload a file associated with a comment to it?<br> </div> Thu, 25 Apr 2024 09:02:49 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971079/ https://lwn.net/Articles/971079/ taladar <div class="FormattedComment"> What do you expect turning off comments achieve in this case?<br> <p> The problem isn't comments, the problem is file uploads for comments being made accessible outside of the comment context.<br> </div> Thu, 25 Apr 2024 06:42:38 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971073/ https://lwn.net/Articles/971073/ Heretic_Blacksheep <div class="FormattedComment"> I haven't used Github since I graduated a couple of years ago, and I only used it then because profs were kinda expecting us to use it. I never particularly cared for using the service so I only used it in very general terms...<br> <p> I realize this isn't a good answer for people that are actively using Github to encourage project communication or cooperation, but for the average person that may only be using it casually, can comments be completely turned off to prevent this kind of thing when you have no wish to engage in this way?<br> </div> Thu, 25 Apr 2024 02:07:30 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971055/ https://lwn.net/Articles/971055/ flussence <div class="FormattedComment"> Oof. That's pretty bad considering they already had a separate domain name for user-generated content for exactly this reason.<br> </div> Wed, 24 Apr 2024 16:48:05 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971053/ https://lwn.net/Articles/971053/ josh <div class="FormattedComment"> <span class="QuotedText">&gt; I think the "right" solution here would be to change `/microsoft/vcpkg/` to `/comments/username_of_comment_author/`, or something like that.</span><br> <p> This seems like the right answer, yeah.<br> <p> This rhymes with a previous exploit of this type: if you made a PR against a repository, you could link to files via that repository and your commit hash, and they'd look like they were part of the repository. GitHub's fix was to show a banner saying they weren't part of the repository.<br> </div> Wed, 24 Apr 2024 16:31:27 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971051/ https://lwn.net/Articles/971051/ rrolls <div class="FormattedComment"> A wonderful example of an inventive exploit and an unintended loophole.<br> <p> <span class="QuotedText">&gt; The URLs for the malware installers [would appear like, for example:]</span><br> <span class="QuotedText">&gt; https://github[.]com/microsoft/vcpkg/files/14125503/Cheat.Lab.2.7.2.zip</span><br> <p> I think the "right" solution here would be to change `/microsoft/vcpkg/` to `/comments/username_of_comment_author/`, or something like that.<br> <p> It's `username_of_comment_author` who controls that content, so the URL should make that clear, and not associate it with a well-known entity that isn't responsible for it.<br> <p> Though, I imagine they'll have a tricky time actually implementing such a change...<br> </div> Wed, 24 Apr 2024 16:26:56 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971046/ https://lwn.net/Articles/971046/ mbunkus <div class="FormattedComment"> I like the idea of only hashing, but noch so much of adding a prefix, whatever it may be. We humans tend to latch on to known things, meaning we might spot a well know repository name in the URL and then just stop scrutinizing the URL further. <br> </div> Wed, 24 Apr 2024 15:26:08 +0000 GitHub comments used to distribute malware (BleepingComputer) https://lwn.net/Articles/971044/ https://lwn.net/Articles/971044/ wtarreau <div class="FormattedComment"> I find the principle of operation really awesome. I mean, how to trust a well-known name on a well-known site. It's comparable in principle to those who were placing high-profile company names inside their domain names or as a host name part of their domain to appear legit to the untrained reader.<br> <p> Maybe as a fix it could be sufficient to hash the whole URLs and only deliver cryptic hashes for these downloads so that they don't appear more trustable than any othe one. Another approach could be to prepend "unsafe-area/" in front of the repository names maybe.<br> <p> </div> Wed, 24 Apr 2024 15:16:45 +0000