{"id":3746,"date":"2023-01-03T08:00:00","date_gmt":"2023-01-03T08:00:00","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=3746"},"modified":"2024-03-15T15:32:11","modified_gmt":"2024-03-15T15:32:11","slug":"ultimate-review-of-github-related-fackups-in-2022","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/","title":{"rendered":"Ultimate Review of the most infamous GitHub-related security incidents in 2022"},"content":{"rendered":"\n<p>We can definitely say 2022 is in the books but we picked out the most interesting and worthwhile bits of news about GitHub-related \u201cfackups\u201d of 2022. Including, serious outages that were at the tips of everyone\u2019s tongues and Twitter feeds, high-severity vulnerabilities, data breaches, stolen credentials (and source code itself!) from well-known brands, and hacker attacks.<\/p>\n\n\n\n<!--more-->\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"641\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/github-status-data-1-1024x641.png\" alt=\"\" class=\"wp-image-4074\" style=\"width:582px;height:365px\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/github-status-data-1-1024x641.png 1024w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/github-status-data-1-300x188.png 300w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/github-status-data-1-768x481.png 768w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/github-status-data-1-400x250.png 400w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/github-status-data-1.png 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Our selfish goal is pretty obvious &#8211; this article is the best answer to the question &#8220;why backup GitHub data&#8221; and we believe it will close this discussion once and for all.&nbsp;<\/p>\n\n\n\n<p>Check out our review of 2022 threats and failures related to GitHub. <\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">December 2022<br><strong>GitHub status info:<\/strong> 6 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Okta&#8217;s source code stolen after a hack on GitHub repositories<\/h2>\n\n\n\n<p>Right before Christmas, Okta, a leading provider of authentication and Identity and Access Management (IAM) solutions, admitted that its private <a href=\"https:\/\/gitprotect.io\/blog\/github-repository-vs-project\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub repositories<\/a> were hacked. The security incident involved threat actors stealing Okta&#8217;s source code. Luckily, despite stealing the code, attackers did not gain unauthorized access to the Okta service or customer data, confirmed the company. <\/p>\n\n\n\n<p>Oops, it happened again. September this year, Okta subsidiary AuthO, has disclosed a &#8220;security event&#8221;. Multiple code repository archives from 2020 and earlier were obtained by unknown means from its environment. But, Okta&#8217;s problems began long before &#8211; in January and continued for months. It&#8217;s been a difficult year for the Okta security team and it looks like the Christmas break wasn\u2019t so merry after all.<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/oktas-source-code-stolen-after-github-repositories-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a> | <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/auth0-warns-that-some-source-code-repos-may-have-been-stolen\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">GitHub Actions vulnerable to Rust artifact poisoning possible<\/h2>\n\n\n\n<p>Legit Security discovered and revealed a new software supply chain vulnerability class in GitHub Actions and Rust. It enabled artifact poisoning to attack the underlying software development pipelines by replacing a legitimate artifact\u2019s content with a malicious payload. Once in place, this infected data could have been used to perform attacks using Rust and GitHub Actions. It enabled any users to execute code in a privileged pipeline. So, a hacker could extract repo secrets and credentials, modify settings, or tamper with the source code with GitHub API use in the worst scenario. This attack highlighted the risk that insecure software pipelines pose. It also showed that this problem likely affects a huge number of open-source projects as its maintainers usually run tests on contributed code before analyzing it by themselves.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/thenewstack.io\/github-actions-were-vulnerable-to-rust-artifact-poisoning\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The News Stack<\/a> | <a href=\"https:\/\/www.darkreading.com\/application-security\/artifact-poisoning-github-actions-malware-software-pipelines\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dark Reading<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">November 2022<br><strong>GitHub status info:<\/strong> 19 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dropbox breach &#8211; hackers steal 130 GitHub repositories&nbsp;<\/h2>\n\n\n\n<p>It all started with phishing and human error\u2026 Dropbox disclosed a security breach after threat actors stole 130 code repositories using git credentials theft trick and stole employee credentials in a phishing attack &#8211; by faking a CircleCI email, login screen, and including a malicious link. The code accessed by this threat actor contained some credentials and API keys used by Dropbox developers along with a few thousand names and email addresses belonging to employees. Dropbox claims these code repositories were not connected to their core applications, instead that this repo contained modified third-party libraries, internal prototypes, and other internal tools. We will probably never know how much this data was worth to the company and how much the incident cost them after all.<\/p>\n\n\n\n<p>We highly recommend a thorough analysis of our GitGuardian colleagues&#8217; article on the <a href=\"https:\/\/blog.gitguardian.com\/dropbox-breach-hack-github-circleci\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dropbox breach<\/a>.<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/dropbox-discloses-breach-after-hacker-stole-130-github-repositories\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">GitHub Copilot hit with a code copyright lawsuit&nbsp;<\/h2>\n\n\n\n<p>GitHub Copilot \u2013 a programming auto-suggestion tool trained from public source code on the internet \u2013 has been caught generating what appears to be copyrighted code. On the 3rd of November, GitHub, Microsoft, and OpenAI have been hit with a class-action lawsuit concerning alleged open-source license copyright violations arising from the use of GitHub Copilot. The plaintiffs, led by programmer and lawyer Matthew Butterick, allege that Copilot reproduces their copyrighted code without attribution or notifying users of license requirements. The 56-page suit claims Copilot \u201cviolates the licenses that open-source programmers chose and monetizes their code despite GitHub\u2019s pledge never to do so.\u201d<\/p>\n\n\n\n<p>The situation is still developing\u2026 To be continued\u2026&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.datacenterknowledge.com\/microsoft\/microsoft-github-openai-hit-code-copyright-lawsuit\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Data Center Knowledge<\/a> | <a href=\"https:\/\/www.techtarget.com\/searchsoftwarequality\/news\/252526359\/Developers-warned-GitHub-Copilot-code-may-be-licensed\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">TechTarget<\/a>&nbsp;<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">October<br><strong>GitHub status info:<\/strong> 17 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Checkmarx \u201cRepoJacking\u201d report: how to attack the software supply chain with a simple rename<\/h2>\n\n\n\n<p>Checkmarx Supply Chain Security team found a \u201chigh-severity\u201d vulnerability in GitHub that could allow an attacker to take control over a GitHub repo, and potentially infect all apps and other code with a malicious payload. Vulnerable to this flaw were all renamed usernames on GitHub, including over 10K packages on the Go, Swift, and Packagist package managers. As a result, thousands of packages could have been hijacked and served malicious code to millions of GitHub users. RepoJacking is a technique to hijack renamed repository URLs traffic and directing it to the attacker\u2019s repo by exploiting a logical flaw that breaks the original redirect. A GitHub repository becomes vulnerable when its owner decided to rename his username while the old username is available for registration. Luckily, the vulnerability was fixed by GitHub after unveiling it by the Checkmarx team.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/checkmarx.com\/blog\/attacking-the-software-supply-chain-with-a-simple-rename\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Checkmarx<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Toyota data breach involving source code hosted on GitHub<\/h2>\n\n\n\n<p>On October 7th, Toyota revealed they had accidentally exposed a credential allowing access to customer data in a public GitHub repo for\u2026 almost 5 years (!). Scale? Exposed data included identification numbers and emails of over 290,000 customers. Luckily, credit card data, phone numbers, or any GitHub user account credentials were not stored in this database. As of now, there is no sign that this breach would allow bad actors to do more than just harvest emails and the associated customer management numbers.&nbsp; Toyota has not been able to confirm any abuse or attacks have occurred using harvested data.<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/blog.gitguardian.com\/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitGuardian<\/a> | <a href=\"https:\/\/www.digitaljournal.com\/business\/toyota-data-breach-involving-source-code-hosted-on-github\/article#ixzz7oCFuE78c\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Digital Journal&nbsp;<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">September&nbsp;<br><strong>GitHub status info:<\/strong> 15 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Department of Veterans Affairs investigates breach after federal contractor publishes source code<\/h2>\n\n\n\n<p>Human error &#8211; again. The Department of Veterans Affairs was conducting a cyber breach investigation after one of the contractors allegedly copied source code from a VA-managed GitHub account and published it on their own personal GitHub account and then switched to public mode. The exposed information included hard-coded admin account privileges, encrypted key tokens, and specific database table information. Moreover, this data is said to have been cloned by at least six unrelated IP addresses. On the other hand, according to VA spokesperson, the data was not administrative credentials and did not present a risk to VA or Veteran data.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.fedscoop.com\/va-investigates-breach-after-federal-contractor-publishes-source-code\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FedScoop<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Merge requests and GitHub workflows may lead to supply-chain attacks<\/h2>\n\n\n\n<p>Security researchers at Legit Security identified vulnerabilities in the GitHub automated workflows used by Google Firebase and Apache Camel that could have been abused to compromise those open-source projects through their GitHub CI\/CD pipeline and insert malicious code. This exploitation technique named &#8220;GitHub Environment Injection&#8221; enables the exploitation platform&#8217;s automated integration and injecting a malicious payload into a GitHub environment variable called GITHUB_ENV. This way a compromised or rogue developer could have used it to alter the source code for Apache Camel or Firebase and conduct a supply-chain attack on this code users. As a result, this malicious code could have ended up being widely deployed.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.theregister.com\/2022\/09\/01\/google_firebase_apache_camel_github\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Register<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CircleCI &amp; GitHub phishing scam &#8211; be warned<\/h2>\n\n\n\n<p>On September 16, GitHub Security warned their users against a phishing campaign impersonating CircleCI to steal user credentials and two-factor codes. Threat actors made a fake GitHub login phishing site to steal any credentials entered &#8211; including 2FA codes (except those with hardware security keys). Then it was possible to instantly create GitHub Personal Access Tokens (PATs), authorize OAuth applications, and add SSH keys to the account to preserve access just in case the user changes their password. Threat actors could also download private repository content, including the one owned by organizations and collaborators (and then wipe it out, leak it, sell it, or blackmail the organization). They could also create new GitHub user accounts (if a compromised one had management permissions) and add them to an organization for future reference.<\/p>\n\n\n\n<p>The list of recommendations to protect the account from GitHub included a password and 2FA codes reset and a review of PATs. GitHub recommended user hardware security keys, WebAuthn 2FA, or a browser-integrated password manager with an auto-fill option. A good security practice is also to have a <a href=\"https:\/\/gitprotect.io\/github.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub backup<\/a> to ensure data recovery and business continuity in the event of code wipe-out, deletion, and ransomware practices.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/github.blog\/2022-09-21-security-alert-new-phishing-campaign-targets-github-users\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Gi<\/a><a href=\"https:\/\/github.blog\/2022-09-21-security-alert-new-phishing-campaign-targets-github-users\/\" target=\"_blank\" rel=\"noreferrer noopener\">tHub<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:22px\"><strong>Eliminate data loss risk and ensure business continuity with <\/strong><br><strong>the first TRUE Disaster Recovery software for GitHub<\/strong>.  <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-white-color has-text-color has-background wp-element-button\" href=\"https:\/\/gitprotect.io\/sign-up.html\" style=\"border-radius:50px;background-color:#ff0300\" target=\"_blank\" rel=\"noreferrer noopener\">Start 14 days free GitProtect trial<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">August&nbsp;&nbsp;<br><strong>GitHub status info:<\/strong> 11 incidents&nbsp;<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">July&nbsp;&nbsp;<br><strong>GitHub status info:<\/strong> 3 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">GitHub Actions and Azure VMs on crypto miners target<\/h2>\n\n\n\n<p>GitHub Actions and Azure virtual machines (VMs) are being leveraged for cloud-based cryptocurrency mining. According to Trend Micro researcher, &#8220;Attackers can abuse the runners or servers provided by GitHub to run an organization&#8217;s pipelines and automation by maliciously downloading and installing their own cryptocurrency miners to gain profit easily&#8221;. It identified no fewer than 1K repositories and over 550 code samples that were mining cryptocurrency using the runners provided by GitHub. Cryptojacking groups are well known to infiltrate cloud deployments through the exploitation of a different security flaw within target systems (i.e. weak credentials, unpatched bugs, or a misconfigured cloud implementation) and it seems like GitHub was not an exception.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/thehackernews.com\/2022\/07\/cloud-based-cryptocurrency-miners.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">June&nbsp;&nbsp;<br><strong>GitHub status info:<\/strong> 13 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">GitHub users beware! Thousands of tokens exposed in Travis CI logs<\/h2>\n\n\n\n<p>Travis CI, a platform for software development and testing, has exposed user data containing authentication tokens to developers\u2019 accounts on GitHub, AWS, and Docker Hub &#8211; for a second time this year. Ok, it wasn\u2019t GitHub&#8217;s fault but still, its users could be concerned and endangered (once they used Travis CI). The platform\u2019s API offers access to over 770 million logs with various types of credentials of free-tier users. According to researchers at Aqua Security, it exposed tens of thousands of user tokens through an API call that allowed fetching logs in clear text when using the right log number. After analyzing around 8 million logs, the researchers found around 73K sensitive strings, that included tokens, secrets, and credentials to GitHub, AWS, and Docker Hub accounts.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/thousands-of-github-aws-docker-tokens-exposed-in-travis-ci-logs\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">May&nbsp;<br><strong>GitHub status info:<\/strong> 8 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">GitHub, Heroku, OAuth tokens case &#8211; continued<\/h2>\n\n\n\n<p>In April 2022, GitHub has alarmed about an attack using a stolen AWS API key that has been obtained when the attackers downloaded private npm repositories by abusing a compromised OAuth token from Heroku or Travis-CI &#8211; two third-party OAuth integrators. Heroku confirmed that the attacker downloaded a subset of the Heroku private GitHub repositories from GitHub that contained some Heroku source code.<\/p>\n\n\n\n<p>After analyzing the attackers\u2019 behavior, GitHub concluded in early May that they were listing organizations solely with the purpose of identifying accounts and private repositories to download and clone and the attack was very targeted. And in fact, much worse than we all thought. The attackers gained access to the private GitHub repositories of dozens of organizations.<\/p>\n\n\n\n<p>Salesforce, which owns Heroku said the company\u2019s investigation found that the same exposed token that was used in April\u2019s attack was reused to gain access to a database and exfiltrate the hashed and salted passwords of customer user accounts (the number remains unknown).<\/p>\n\n\n\n<p>Salesforce also ensured that they have rotated and refreshed internal Heroku credentials and put additional detections in place. GitHub also announced that it will require developers to use obligatory two-factor authentication by the end of 2023.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.securityweek.com\/github-warns-private-repositories-downloaded-using-stolen-oauth-tokens\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Week<\/a> | <a href=\"https:\/\/www.scmagazine.com\/news\/application-security\/another-database-compromise-reported-in-github-heroku-oauth-tokens-case\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">SC Media<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">April<br><strong>GitHub status info:<\/strong> 8 incidents&nbsp;<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">March<br><strong>GitHub status info:<\/strong> 20 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An unfortunate series of GitHub outages<\/h2>\n\n\n\n<p>After a series of repeated outages, GitHub was beefing up the hardware and making improvements to its MySQL database cluster to prevent outages from reoccurring. GitHub confirmed that its service downtime over the past weeks happened due to issues affecting the &#8220;health of their database&#8221;, resulting in a degraded experience for developers and impacting the performance of a large number of their services and features during periods of peak load.&nbsp;<\/p>\n\n\n\n<p>During this period people reported on social media problems with pushes and pull requests, as well as multi-hour incidents on March 16, 17, 22, and 23 that lasted between two and five hours each.<\/p>\n\n\n\n<p>GitHub is constantly taking steps to prevent its database cluster from becoming overwhelmed with traffic across its services. Well, keeping infrastructure up and running is one of their duties resulting from the <a href=\"https:\/\/gitprotect.io\/blog\/github-shared-responsibility-model-and-source-code-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shared Responsibility Model<\/a> in which GitHub operates.<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.zdnet.com\/article\/github-were-sorry-for-all-the-outages-heres-whats-went-wrong\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ZDNet<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerabilities found in GitHub open-source projects could impact millions<\/h2>\n\n\n\n<p>Critical vulnerabilities were found in several popular open-source projects. Many of them can cause a supply chain attack through the <a href=\"https:\/\/gitprotect.io\/blog\/continuous-integration-and-continuous-delivery-with-jira-done-right-advanced\/\" target=\"_blank\" rel=\"noreferrer noopener\">continuous integration<\/a> (CI) process. Vulnerabilities were found in misconfigured GitHub Actions workflows with missing proper input sanitizing. It can impact millions of potential victims and allow malicious actors to inject code into the builds through issues and comments as well as to access privileged tokens.<\/p>\n\n\n\n<p>Of the dozens of vulnerable repositories, the most popular were: Liquibase, Dynamo BIM, Wire, FaunaDB, Kogito, Astro, and Ombi.<\/p>\n\n\n\n<p>Open source has become a critical component in all modern apps and we can foresee that these projects will be a constant target of hacker attacks. To close up the security gaps, organizations will need to include all the principles of defense-in-depth and zero-trust approach to the entire CI\/CD pipeline. They shouldn\u2019t forget to actively prevent and mitigate risks, and to include secret scanning and <a href=\"https:\/\/gitprotect.io\/github.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub backup<\/a> as the final line of security.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.scmagazine.com\/news\/devops\/vulnerabilities-found-in-popular-open-source-projects-on-github-could-impact-millions\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">SC Magazine<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">February&nbsp;<br><strong>GitHub status info:<\/strong> 6 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">GitHub outage impacts Actions, Codespaces, PR and Issues<\/h2>\n\n\n\n<p>February started with a worldwide outage preventing access to the website, issuing commits, cloning projects, or performing pull requests.<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/github-outage-impacts-actions-codespaces-issues-pull-requests\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Rogue GitHub apps could have hijacked countless repositories<\/h2>\n\n\n\n<p>A GitHub bug could have been exploited by connected third-party apps to hijack repositories. For almost a week between late February and early March, some rogue apps could have generated installation tokens with escalated permissions that could lead to unauthorized write or administrative access to developers&#8217; repos. In a worst-case scenario, every newly generated token during that period of time could have been elevated to grant the administrator access. However, according to Microsoft, this security blunder has been addressed before any miscreants abused the flaw.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:16px\"><a href=\"https:\/\/www.theregister.com\/2022\/06\/21\/github_bug_apps\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Register<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#fafafa\">January&nbsp;&nbsp;<br><strong>GitHub status info:<\/strong> 7 incidents&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What to do in 2023 to keep your data safe?&nbsp;<\/h2>\n\n\n\n<p>Well, the first recommendation that you probably won&#8217;t be able to avoid as GitHub will force you to do so by the end of 2023 is to implement 2FA (and the hardware key is something to consider) to keep your login and accounts protected.<\/p>\n\n\n\n<p>You shouldn\u2019t forget to actively prevent and mitigate risks. You should definitely include all the principles of defense in depth, the principle of least privilege, and the zero-trust approach to the entire CI\/CD pipeline of all currently active GitHub users.<\/p>\n\n\n\n<p>Don\u2019t forget about secret scanning. GitGuardian, the secret detection platform only this year alerted about credential leaks from Samsung, Uber, Dropbox, and Nvidia. So if it happens to the biggest ones, it can happen to anyone.<\/p>\n\n\n\n<p>Finally, if all of the security means fail, remember to have <a href=\"https:\/\/gitprotect.io\/github.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub backup<\/a> as the final line of <a href=\"https:\/\/gitprotect.io\/blog\/devops-security-data-protection-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps security<\/a>. GitHub down? Simply use Disaster Recovery technologies to instantly restore all repositories and metadata to many locations and work uninterruptedly. Also note that having <a href=\"https:\/\/gitprotect.io\/azure-devops-backup.html\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps backup<\/a> in place is one of the fundamental requirements in all major certifications, such as SOC 2 or ISO 27001, as well as your obligation under the Shared Responsibility Model.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Useful resources:&nbsp;<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong>E-books<\/strong>&nbsp;<br><a href=\"https:\/\/gitprotect.io\/ci-cd-guide.html\" target=\"_blank\" rel=\"noreferrer noopener\">The DevOps Guide to Backup in CI\/CD<\/a><br><a href=\"https:\/\/gitprotect.io\/github-backup-guide.html\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub Backup Guide<\/a><br><br><strong>Cheat Sheet<\/strong><br><a href=\"https:\/\/gitprotect.io\/docs\/github-cheat-sheet.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub Backup Cheat Sheet<\/a><br><br><strong>Blog posts&nbsp;<\/strong><br><a href=\"https:\/\/gitprotect.io\/blog\/github-backup-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub Backup Best Practices<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/github-restore-and-github-disaster-recovery-scenarios-and-use-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub Disaster Recovery and GitHub Restore \u2013 Scenarios &amp; Use Cases<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/github-shared-responsibility-model-and-source-code-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub Shared Responsibility Model and Source Code Protection<\/a><br><a href=\"https:\/\/gitprotect.io\/blog\/how-to-clone-using-ssh-in-git\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Clone Using SSH in Git?<\/a><br><br><strong>Videos<\/strong><br><a href=\"https:\/\/youtube.com\/playlist?list=PLG6ltpnBw0zG-UvV9nsyiNwobQNUYrlQX\" target=\"_blank\" rel=\"noreferrer noopener\">GitProtect Academy<\/a><br><a href=\"https:\/\/www.youtube.com\/watch?v=xBm2THIIrmw\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps backups vs. ransomware (joint webinar with GitGuardian)&nbsp;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We can definitely say 2022 is in the books but we picked out the most interesting and worthwhile bits of news about GitHub-related \u201cfackups\u201d of 2022. Including, serious outages that were at the tips of everyone\u2019s tongues and Twitter feeds, high-severity vulnerabilities, data breaches, stolen credentials (and source code itself!) from well-known brands, and hacker attacks.<\/p>\n","protected":false},"author":5,"featured_media":3779,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-github","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ultimate Review of the most infamous GitHub-related security incidents in 2022 - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ultimate Review of the most infamous GitHub-related security incidents in 2022 - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"We can definitely say 2022 is in the books but we picked out the most interesting and worthwhile bits of news about GitHub-related \u201cfackups\u201d of 2022. Including, serious outages that were at the tips of everyone\u2019s tongues and Twitter feeds, high-severity vulnerabilities, data breaches, stolen credentials (and source code itself!) from well-known brands, and hacker attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-03T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-15T15:32:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marta Przybylska, Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Przybylska, Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/\"},\"author\":{\"name\":\"Marta Przybylska, Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/fa22c4de2bf6a4418caa83f17a206621\"},\"headline\":\"Ultimate Review of the most infamous GitHub-related security incidents in 2022\",\"datePublished\":\"2023-01-03T08:00:00+00:00\",\"dateModified\":\"2024-03-15T15:32:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/\"},\"wordCount\":2664,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png\",\"articleSection\":[\"GitHub\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/\",\"name\":\"Ultimate Review of the most infamous GitHub-related security incidents in 2022 - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png\",\"datePublished\":\"2023-01-03T08:00:00+00:00\",\"dateModified\":\"2024-03-15T15:32:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ultimate Review of the most infamous GitHub-related security incidents in 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/fa22c4de2bf6a4418caa83f17a206621\",\"name\":\"Marta Przybylska, Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fdc25e906234f27fdc12626a083958cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fdc25e906234f27fdc12626a083958cd?s=96&d=mm&r=g\",\"caption\":\"Marta Przybylska, Content Writer at GitProtect.io\"},\"description\":\"Marta is the CMO of GitProtect and Xopero. She has done all her career in the software industry - starting from gaming, through startups, ending with Developer Marketing and cybersecurity. In everyday duties, it quickly turned out that it was easier for her to understand and learn technology than to wait for developers' answers. And that's how the deep relationship with technology, DevOps and cybersecurity started.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/m-przybylska\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ultimate Review of the most infamous GitHub-related security incidents in 2022 - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/","og_locale":"en_US","og_type":"article","og_title":"Ultimate Review of the most infamous GitHub-related security incidents in 2022 - Blog | GitProtect.io","og_description":"We can definitely say 2022 is in the books but we picked out the most interesting and worthwhile bits of news about GitHub-related \u201cfackups\u201d of 2022. Including, serious outages that were at the tips of everyone\u2019s tongues and Twitter feeds, high-severity vulnerabilities, data breaches, stolen credentials (and source code itself!) from well-known brands, and hacker attacks.","og_url":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2023-01-03T08:00:00+00:00","article_modified_time":"2024-03-15T15:32:11+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png","type":"image\/png"}],"author":"Marta Przybylska, Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Marta Przybylska, Content Writer at GitProtect.io","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/"},"author":{"name":"Marta Przybylska, Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/fa22c4de2bf6a4418caa83f17a206621"},"headline":"Ultimate Review of the most infamous GitHub-related security incidents in 2022","datePublished":"2023-01-03T08:00:00+00:00","dateModified":"2024-03-15T15:32:11+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/"},"wordCount":2664,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png","articleSection":["GitHub"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/","url":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/","name":"Ultimate Review of the most infamous GitHub-related security incidents in 2022 - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png","datePublished":"2023-01-03T08:00:00+00:00","dateModified":"2024-03-15T15:32:11+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/01\/github_on_fire.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/ultimate-review-of-github-related-fackups-in-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Ultimate Review of the most infamous GitHub-related security incidents in 2022"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/fa22c4de2bf6a4418caa83f17a206621","name":"Marta Przybylska, Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fdc25e906234f27fdc12626a083958cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fdc25e906234f27fdc12626a083958cd?s=96&d=mm&r=g","caption":"Marta Przybylska, Content Writer at GitProtect.io"},"description":"Marta is the CMO of GitProtect and Xopero. She has done all her career in the software industry - starting from gaming, through startups, ending with Developer Marketing and cybersecurity. In everyday duties, it quickly turned out that it was easier for her to understand and learn technology than to wait for developers' answers. And that's how the deep relationship with technology, DevOps and cybersecurity started.","url":"https:\/\/gitprotect.io\/blog\/author\/m-przybylska\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/3746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=3746"}],"version-history":[{"count":16,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/3746\/revisions"}],"predecessor-version":[{"id":5186,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/3746\/revisions\/5186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/3779"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=3746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=3746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=3746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}