On Mon, Jun 24, 2013 at 9:17 PM, Graydon Hoare <[email protected]> wrote:
> Hi,
>
> Some clever folks on #rust have pointed out that there is a (somewhat)
> exploitable security flaw in the way bors consumes r+ comments.
> Specifically, github permits a repository owner, in some circumstances
> (which we can't quite figure out) to _edit comments of other people_ on
> commits in their repository.
>
> This means that the following attack scenario would work:
>
>
>   DrEvil: Files a PR
>   Reviewer: Comments "this is awful!" on PR head-commit
>   DrEvil: Edits comment to "r+ p=100" and lands change
>
> So, to work around this I'll probably teach bors to require review comments
> in a different fashion, such as "r+ <sha1>" on the PR itself, or similar. In
> the meantime, reviewers beware: anything you say on the head-commit of a PR
> can be rewritten by the submitter into an r+, so assume that "commenting _at
> all_ implies approval".

Also, not just the head commit because someone could reset and force push. :P
_______________________________________________
Rust-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/rust-dev

Reply via email to