Feedback on the fix to improve security around creation of pull requests in public repos #57972
Replies: 8 comments 6 replies
-
Just one question - what exactly have you fixed? :) |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
This comment was marked as spam.
This comment was marked as spam.
-
This change is extremely problematic, especially without any notice to customers or any ability to toggle the behavior. We've lost nearly 2 days (plus the GitHub support team's time) trying to debug why automation workflows are suddenly failing. We have some very common automation workflows that:
A few concrete use cases include keeping a JSON version manifest up to date or a mirroring binary checksums, but there are many. We also some some additional requirements:
None of the proposed workarounds are viable:
@willsmythe you can see support ticket 2207046 for more information. |
Beta Was this translation helpful? Give feedback.
This comment was marked as off-topic.
This comment was marked as off-topic.
-
I'm not highly skew but I would like to help if there's anything that I could do I'm here |
Beta Was this translation helpful? Give feedback.
-
Not yet! i dont care about public repos i just want my github mempool
anything under the octocat martinlopez799 ml_tubby mltubby210
thats all my data being used without my permission then selling my data and
collecting on me the fukr lives across da street guess i know what needs
sweet old school American street justice then
…On Wed, Feb 14, 2024, 3:40 PM Josh Soref ***@***.***> wrote:
@willsmythe <https://github.com/willsmythe>: was this implemented?
—
Reply to this email directly, view it on GitHub
<#57972 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/A4PYKGVBMNINRS6F3Y4NECTYTUVMLAVCNFSM6AAAAAAZFJ4ZZKVHI2DSMVQWIX3LMV43SRDJONRXK43TNFXW4Q3PNVWWK3TUHM4DINZSG43DG>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
Hey Community/Community Support Team how is it that he still on my account
developing program if I never did before and without my consent he's been
stealing my data and crypto currency from mempool
…On Wed, Feb 14, 2024, 3:40 PM Josh Soref ***@***.***> wrote:
@willsmythe <https://github.com/willsmythe>: was this implemented?
—
Reply to this email directly, view it on GitHub
<#57972 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/A4PYKGVBMNINRS6F3Y4NECTYTUVMLAVCNFSM6AAAAAAZFJ4ZZKVHI2DSMVQWIX3LMV43SRDJONRXK43TNFXW4Q3PNVWWK3TUHM4DINZSG43DG>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
Select Topic Area
Product Feedback
Body
We've shipped a small fix to improve security around creation of pull requests in public repos.
Prior to this fix and under very specific conditions, a user could create a pull request in a public repo even though they did not have push access to either the base or head branch and were not a member of the repo's organization. Often these pull requests were created by mistake and quickly closed, but could still trigger unexpected GitHub Actions or other CI jobs.
This fix has no impact on the common open source workflow where a user forks a public repo, makes a change in their fork, and then proposes their change using a pull request. This fix also has no impact on pull requests already created.
Let us know what you think or if you have questions!
Beta Was this translation helpful? Give feedback.
All reactions