Hacked pipeline? These are just pull requests anyone can submit them.
Technology
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
They are authentic commits and PRs by real contributors that have been edited and renamed with the PR description changed.
Oh that is mildly interesting, my mistake. So the actual commits didn't change but the pull requests are made to look like they are something else.
I think the top one might be the culprit. But it might be the guy's account was hacked?
On his repo he has a fork of WSL and the repo is called "free-palestine", he tried to merge the branch "freedom". So that PR seems likely to be linked to this. Other than this, activity seems normal for a terminal githubber with 444 repos...
If you watch the PRs history, you can see that the user github-actions
edited them. This user is the default one when a GitHub Action (the pipeline OP refers to) alters the repo. So someone probably submitted a pull request abusing the GitHub token when the Action ran on their PR.
Thank you for your contribution to WSL.
No fatal errors have been found.
No suggestions have been found.
based
How can such thing happen? Was an account hacked that had the permissions?
Most likely someone submitted a pull request that abused the GitHub token of the Action running on new PRs in order to edit all the other pull requests.
It could also be an inside job. Anti-genocide resistance within Microsoft is quite strong and active.
based