Hacker News new | past | comments | ask | show | jobs | submit login

Does anyone know what to look for in the github audit logs, exactly?



Tangentially, You can view your oauth linked services here https://github.com/settings/applications


Last year when I looked into this there was no automated way to get this info; the normal audit log mentioned below does not contain any info about actions from oauth-ed applications afaik.

If you email GitHub support they can pull out detailed logs from oauth app interactions from their internal tools.

I would expect the GH security team to have relevant queries ready by now, maybe even do some proactive queries and start alerting anyone who had suspicious activity. (But this is just how I'd do it I have no special insight if they are doing this or something else).



I used here:

https://github.com/organizations/<ORG_NAME>/settings/audit-l...

... but the real question is what would malicious activity look like, exactly?


I see a heap of "downloaded a zip of repository" but I suspect that's Heroku CI or other CI tool running.


Same. Most belong to 1 member of our team, but a few belong to others on the team. They started happening about 6 months ago (unless logs only go back 6 mo). Would really like to figure out what these are. I asked GH, they said it’s not involved with this breach, and haven’t yet answered my next question (who/what is it?)


Yeah I see lots of the same. They seem to correspond with Heroku deploys? Anyone know if that happens when a valid heroku deploy occurs? Do they download a zip?

I've reached out to Heroku support to ask.


Normal Heroku usage doesn’t download a zip because it uses git directly, but I’ve seen plenty of CI tools download zips.


Including Heroku CI? We don't use an external CI tool (or really any other integrations except GH), but I do see these download logs.


For what it's worth, elsewhere in this comment section someone posted that Github Support says the zip downloads weren't related to this incident. Reading between the lines, the compromised repos were probably accessed using normal git clone actions.


That was me who posted that :) seems unrelated, but still hoping to get that figured out anyway.


I thought as much. Maybe it is CircleCI then.


Please let us know if you get any info from them! :)


I believe OP was asking what to look out for within the security log, not how to look at the security log.


Don’t think these logs mention the oauth application being used to access at all.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: