I am evaluating the security of GitHub Store and have concerns regarding the 'Trust Chain.' The XZ Utils backdoor proved that 'Open Source' does not mean 'Safe.'
As an app that automates the installation of third-party binaries, you are effectively a gatekeeper. I have three specific critical questions:
Automated Trust: Beyond a legal disclaimer, what technical hurdles exist to prevent an upstream attacker from using your platform to push a malicious update to your 48,000+ users?
Verification: Does the app implement Signature Verification? If a developer signs their APK or AppImage, does GitHub Store verify that signature before prompting for install?
Infrastructure Security: How do you protect your own GitHub Actions/Secrets? If your CI/CD is compromised, an attacker could backdoor the GitHub Store app itself, giving them access to every device your app is installed on.
A 'download at your own risk' disclaimer is standard, but given the scale of this project, what is the roadmap for moving toward a 'Zero Trust' architecture?