Skip to content
Discussion options

You must be logged in to vote

Short answer: Very limited, but not impossible. Here's what you can and can't do without code analysis:

What you CAN check without analyzing code:

  • Commit history metadata — Author names, emails, timestamps, commit
    message patterns. Look for suspicious signs like bulk commits,
    inconsistent author info, or commits backdated to unusual times.
  • File names and structure — Even without reading the code, file names
    and directory structure can reveal intent (e.g., tools commonly
    associated with malicious activity).
  • Commit frequency and patterns — Irregular bursts of activity,
    force-pushes rewriting history, or suspiciously clean linear history
    can be red flags.
  • Stars, forks, and watchers — A repo…

Replies: 2 comments 1 reply

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
1 reply
@oliverhausler
Comment options

Answer selected by oliverhausler
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Code Security Build security into your GitHub workflow with features to keep your codebase secure Question Ask and answer questions about GitHub features and usage
3 participants