Nasser,

Two factor authentication was turned on some time ago. Emails were sent out
regarding this.

I personally use Authy as the two factor code generator for GitHub.

This is where the secret code comes from.

Regards

Hill Strong

On Fri, 21 Mar 2025, 9:51 am 'Nasser M. Abbasi' via FriCAS - computer
algebra system, <fricas-devel@googlegroups.com> wrote:

> fyi, this was also mentioned in sagemath group
> https://groups.google.com/g/sage-devel/c/9aXIGEZEoxI
>
> ps. I myself do not use github. Only used it to enter bugs for other
> software. (sagemath, sympy, etc...)
>
> I have not been able to login to my github account, since I do not know
> how to get some secrete code
> it wants me to enter or scan from somewhere.
>
> I do not use apps or know how to use smart phones (I hate smart phones).
>
> So  for one year now, I have not been able to login to github.
>
> --Nasser
> On Thursday, March 20, 2025 at 5:12:17 PM UTC-5 Waldek Hebisch wrote:
>
>> There is now advisory about security break on Github due to
>> Github actions. Link to advisory:
>>
>> https://github.com/advisories/GHSA-mrrh-fwg8-r2c3
>>
>> Unfortunately, such advisories are deliberately written in
>> an obfuscated way (to limit info for potential attackers),
>> but AFAICS specific package (they say "tj-actions changed-files")
>> was modified by malicious actors so that it put info which
>> should be secret into log files.
>>
>> I do not know if we use this package and what exactly could
>> be leaked (I hope that thing running as Github action
>> does not magically get extra priviledges to read things
>> that actions should not read, but who knows). However,
>> I think that there is actually bigger problem:
>> - dependence on Github infrastructure means that any
>> trouble there affects a lot of project. And Github
>> infrastructure is quite complex, so one should
>> expect troubles,
>> - current trend is to have very large dependency graph.
>> Security problem at any point of dependency graph
>> may show up in seemingly unrelated place,
>> - there is tendency for automatic updates and automatic
>> fetching of code via network. More traditional
>> approach limited fetching to "known" things which
>> could be verified via cryptographic checksums and
>> that within a framework with well defined security
>> policy. Now automatic fetching from network
>> is widespread.
>>
>> Open source has advantage due to people different than
>> authors looking at code and noticing bugs. But modern
>> tendencies make it hard to get at source code. And
>> routinely code is put in "production" use without
>> anybody looking at it. I hope you now can understand
>> better why I want to limit external dependencies and
>> why I dislike downloads run as part of build process.
>> To put it differently, it is tempting to delegate
>> tricky problems to other guys. But when everybody
>> delegates, then eventually this will lead to
>> dependence on somebody incompent or malicious.
>>
>> --
>> Waldek Hebisch
>>
> --
> You received this message because you are subscribed to the Google Groups
> "FriCAS - computer algebra system" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to fricas-devel+unsubscr...@googlegroups.com.
> To view this discussion visit
> https://groups.google.com/d/msgid/fricas-devel/c7acdb79-6106-484c-9d2d-b9b0360210acn%40googlegroups.com
> <https://groups.google.com/d/msgid/fricas-devel/c7acdb79-6106-484c-9d2d-b9b0360210acn%40googlegroups.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"FriCAS - computer algebra system" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to fricas-devel+unsubscr...@googlegroups.com.
To view this discussion visit 
https://groups.google.com/d/msgid/fricas-devel/CAEnaMTFytOO%2BEF3f0q70%3DCdU1YRt1yGB2hkJcs4zPtRWBdci%3Dw%40mail.gmail.com.

Reply via email to