Ability to make GitHub pull requests private when they disclose a vulnerability to the public #154262
Replies: 6 comments
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
Would it make sense to have some workflow to convert a PR to a disclosure? There are probably many gotchas, like the fact that the user's fork already contains a commit to fix it. Arguably, people who disregard the defined process are unlikely to write it all down in a proper commit message so that likely obfuscates it a bit. Still not really desirable. |
Beta Was this translation helpful? Give feedback.
-
|
The thing is that ... there might be "infosec" company/team that will monitor any high profile repos and will automatically cache / keep a copy of any issue Even if we removed that PR afterwards , the information is still somewhere .... but yes... will no longer be avaialble for "lazy" infosec teams |
Beta Was this translation helpful? Give feedback.
-
|
There's also a non-infosec side here - it's also an avenue for abusive communication. If someone raises abusive issues, or comments, they can be easily deleted by maintainers. However, if said abuse is in a PR, there's no getting rid of it (without GitHub's involvement anyway) - it's stuck there. All a maintainer can do is close it and hope no one else looks at it. |
Beta Was this translation helpful? Give feedback.
-
|
I'd love to see this implemented. Maybe someone wants to anonymously report a bug (anonynmous at least to the public). |
Beta Was this translation helpful? Give feedback.
-
|
This would be awesome. I read in a reddit post that people report vulnerabilities e-mailing maintainers and creating private forks. I have never tried it so I can't confirm if that is true. However, I believe that private PRs would be more useful because maintainers can later choose to make the whole review and conversations public. And these conversations/reviews could help people to understand the reasoning for the changes that fixed a vulnerability. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
As a project owner/maintainer, I would like the ability to make a GitHub pull request private when the pull request exposes a vulnerability.
Problem: Some users disregard the vulnerability reporting process and disclose vulnerabilities publicly
In order to help us contain a public exposure, we would like to be able to make these PRs private/hidden.
These should then only be viewable to project owners/maintainers and the PR author.
Other users should see a message that the project owners have hidden this PR and no other details. The API should have a similar "insufficient permissions" if querying the hidden PR.
Description updated to remove "issues" as "issues" can be deleted.
Beta Was this translation helpful? Give feedback.
All reactions