Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
How we Abused Repository Webhooks to Access Internal CI Systems at Scale | |||
Bypassing required reviews using GitHub Actions |
Page 1 of 1
Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
How we Abused Repository Webhooks to Access Internal CI Systems at Scale | |||
Bypassing required reviews using GitHub Actions |