Possible to ve #188398
-
Select Topic AreaQuestion BodyWithout actually analysing the code, is it possible to verify the claim made by a user in this public repo when
The repo could be hacking activity. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 1 reply
-
|
No — not reliably. |
Beta Was this translation helpful? Give feedback.
-
|
Short answer: Very limited, but not impossible. Here's what you can and can't do without code analysis: What you CAN check without analyzing code:
What you CAN'T reliably do:
Bottom line: Metadata and structure can raise or lower your suspicion level, but
Without code analysis, you're essentially judging a book by its cover — |
Beta Was this translation helpful? Give feedback.
Short answer: Very limited, but not impossible. Here's what you can and can't do without code analysis:
What you CAN check without analyzing code:
message patterns. Look for suspicious signs like bulk commits,
inconsistent author info, or commits backdated to unusual times.
and directory structure can reveal intent (e.g., tools commonly
associated with malicious activity).
force-pushes rewriting history, or suspiciously clean linear history
can be red flags.