Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Locking down WHATWG more? #113

Closed
annevk opened this issue Sep 14, 2018 · 1 comment
Closed

Locking down WHATWG more? #113

annevk opened this issue Sep 14, 2018 · 1 comment

Comments

@annevk
Copy link
Member

annevk commented Sep 14, 2018

https://blog.mozilla.org/security/2018/09/11/protecting-mozillas-github-repositories-from-malicious-modification/ has a number of interesting recommendations.

We currently don't require 2FA for the entire organization, but I think we do softly enforce it for those that can merge (editors)?

Contact methods are given through the Participate Agreement.

We don't allow force pushing (but sometimes override this to fix an error, is that problematic if it's done by a trusted party?).

We don't do commit signing, but it's not entirely clear to me what the attack scenario is there.

I think we're in a pretty good shape, but it seems good to evaluate if we can do more given that some defined algorithms are rather sensitive. I also don't really want a WHATWG standard to become an example attack vector at some future point.

@annevk
Copy link
Member Author

annevk commented Mar 1, 2023

I think #155 is really all that's important here.

@annevk annevk closed this as not planned Won't fix, can't repro, duplicate, stale Mar 1, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant