Skip to content

Analysis of the Backdoored XZ Utils Build Process with Harden-Runner

License

Notifications You must be signed in to change notification settings

anurag-stepsecurity/xz-clone

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Analysis of the Backdoored XZ Utils Build Process with Harden-Runner

The code was originally sourced from Debian's repository, specifically the debian/5.6.0-0.2 tag.

The GitHub Actions workflow used to run the steps is configured to perform the following:

  • Checkout the code from the repository
  • Run the configure script to generate the Makefile
  • Execute the make step to build the XZ Utils binary

The workflow integrates Harden Runner to monitor and analyze the build process. Here are the Harden Runner insights from the workflow execution: https://app.stepsecurity.io/github/step-security/xz-clone/actions/runs/9102857670?jobid=25085154668&tab=file-events

You can read the blog post here for more details: https://www.stepsecurity.io/blog/analysis-of-backdoored-xz-utils-build-process-with-harden-runner

About

Analysis of the Backdoored XZ Utils Build Process with Harden-Runner

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 56.2%
  • Makefile 16.5%
  • Shell 14.0%
  • M4 6.9%
  • CMake 3.0%
  • Roff 2.6%
  • Other 0.8%