Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There is no evidence GitHub has any multi-party accountability for sysadmins or enclaves for secret management. You enter secrets into the GitHub Web UI in plaintext, which means at least some employees can access them in plaintext.

GitHub/NPM have historically failed to support supply chain integrity practices in their public offerings such as hardware anchored code signing, signed code reviews, reproducible builds, multi-party approvals, etc. It is reasonable to expect they are not doing any of that internally either.

Assume any secret you give GitHub will become public knowledge and act accordingly.

The good news is there is never a reason to trust a VCS or CI system with high value secrets. They should never ever need any power beyond running tests, accessing a test environment, or sending notifications.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: