Skip to content

Critical Security Inquiry: Supply Chain Risks and Trust Verification (Post-XZ Utils) #315

@elytraVIII

Description

@elytraVIII

I am evaluating the security of GitHub Store and have concerns regarding the 'Trust Chain.' The XZ Utils backdoor proved that 'Open Source' does not mean 'Safe.'

As an app that automates the installation of third-party binaries, you are effectively a gatekeeper. I have three specific critical questions:

Automated Trust: Beyond a legal disclaimer, what technical hurdles exist to prevent an upstream attacker from using your platform to push a malicious update to your 48,000+ users?

Verification: Does the app implement Signature Verification? If a developer signs their APK or AppImage, does GitHub Store verify that signature before prompting for install?

Infrastructure Security: How do you protect your own GitHub Actions/Secrets? If your CI/CD is compromised, an attacker could backdoor the GitHub Store app itself, giving them access to every device your app is installed on.

A 'download at your own risk' disclaimer is standard, but given the scale of this project, what is the roadmap for moving toward a 'Zero Trust' architecture?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions