Security gap: Team members can use GitHub App private keys to bypass repo access restrictions #171410
Replies: 1 comment
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Bug
Body
Summary
There is currently a security gap when using GitHub Apps in an organization with multiple repositories and restricted access.
Scenario:
Problem
Even if a user does not have access to Repo B, they can:
This effectively bypasses repository-level access control and exposes sensitive data.
Why this is severe
Desired Behavior
To resolve this, one of the following mechanisms should exist:
User-bound private keys for GitHub Apps
Granular permissions for GitHub App management
Impact
This issue allows any team member with GitHub App management rights to circumvent repository restrictions, creating a critical security risk for organizations with tiered repository access.
Request
Beta Was this translation helpful? Give feedback.
All reactions