Conversation
PR SummaryHigh Risk Overview No functional code is added, but the module’s distributed contents change in a way consistent with a potential supply-chain/security incident and should be treated as high risk. Written by Cursor Bugbot for commit 98dc2b3. This will update automatically on new commits. Configure here. |
|
|
||
| // PoC: this file was merged without maintainer approval via dependabot gate bypass. | ||
| // If you're seeing this, we will be responsibly disclosing this through Bugcrowd. Here is my profile: https://bugcrowd.com/h/towwitowthc1 | ||
| // Contact: hack.erkinyavuz@gmail.com |
There was a problem hiding this comment.
Unauthorized PoC file bypassed CI merge protections
High Severity
This PR claims to be a version bump of cerrors but instead adds a proof-of-concept file (poc.go) that explicitly states it "was merged without maintainer approval via dependabot gate bypass." The PR description is misleading - this repository IS the cerrors library itself, not a consumer of it, so there's no dependency to bump. This file appears to be a security researcher demonstrating a CI/CD vulnerability. Regardless of intent, this file should not be merged as it indicates security controls were bypassed, and the file itself serves no legitimate purpose in the codebase.
|
Hi guys, there is a bug with GitHub Actions here but it seems that the previously existing repos you had that would make this unauthorized write to the main branch no longer exist. These are the repos:
So it's not possible to exploit this. Therefore I'm closing this. |


Bumps cerrors from 1.0.0 to 1.0.1.