frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Ask HN: How are you stopping supply chain attacks via compromised dev keys?

5•CountVonGuetzli•1h ago
GitHub and GitLab will verify that a commit is signed by some key on the user's account. They won't let you require that it be signed by a specific key, like a hardware-backed YubiKey your org issued. So if an attacker compromises a developer's laptop or GitHub account, they can add a new signing key, push commits signed with it, and pass every "Require signed commits" protection in place. The malicious commit lands in the repo with a "Verified" badge.

As far as I can tell, neither platform offers:

- An org-level allowlist of approved signing keys

- A way to reject a push based on the signing key itself

- A built-in way to audit who has accessed what (You have to stream and parse the audit logs yourself!)

The workarounds I've seen, like re-verifying signatures in CI, blocking deployments on unapproved keys, self-hosting Git with pre-receive hooks, all share the same problem: the bad commit still lands in the repo. CI catches it after the fact.

Given recent supply chain attacks, this feels like table stakes, and I'm really fucking annoyed at Github for trying to shove Copilot down my throat instead of helping me with basics like this. We're considering issuing hardware keys to every dev, building a custom verification and audit pipeline, streaming audit logs to our own SIEM, and upgrading to enterprise tiers for basic visibility. That's a lot of work for something that should be built in.

So:

- Are any of you solving this cleanly today? Am I missing something?

- Is everyone relying on CI enforcement?

- Are there platforms that do proper key allowlisting + enforcement? - Or is the answer really "self-host everything and write hooks"?

I'm slowly losing my mind over this. We're a small dev shop and I can't believe we're the first ones to want to be able to fully trust our git log and Github history!

Feels like we're one compromised laptop away from "Verified" supply chain attacks.

Stop Winning Arguments. Start Using "Claude Mode" Instead

https://basila.medium.com/when-youre-fed-up-arguing-try-switching-to-claude-mode-3249f36c01fb
1•pavovap•25s ago•0 comments

How Did REST Come to Mean the Opposite of REST?

https://htmx.org/essays/how-did-rest-come-to-mean-the-opposite-of-rest/
1•vladde•1m ago•0 comments

Trump admin pays wind developers to quit, back fossil fuel projects

https://www.theregister.com/2026/04/28/trump_admin_pay_off_wind_farm/
1•FpUser•5m ago•0 comments

White House Captions Photo of Trump and King Charles as 'Two Kings'

https://www.forbes.com/sites/antoniopequenoiv/2026/04/28/white-house-captions-photo-of-trump-and-...
1•geox•6m ago•0 comments

Show HN: Vibee.sh – SSH-only VM rental. Instant trial, no signup

https://vibee.sh/
1•lfaoro•9m ago•1 comments

Automatic Enum Stringification in C via Build-Time Code Generation

https://medium.com/@yair.lenga/automatic-enum-stringification-in-c-via-build-time-code-generation...
1•yairlenga•10m ago•1 comments

How will AI crypto trading bots shape automated trading in 2026?

https://www.bitdeal.net/crypto-trading-bot-development
2•harrisonrichrd•13m ago•0 comments

The EU to demand collection of Facebook and Instagram user identities

https://ec.europa.eu/commission/presscorner/home/en
1•miohtama•16m ago•0 comments

Taste Games

https://dynomight.net/taste-games/
1•pdrobnjak•17m ago•0 comments

War panic: if you prepare for war to achieve peace, you get war (2024)

https://blogs.lse.ac.uk/medialse/2024/12/19/war-panic-if-you-prepare-for-war-to-achieve-peace-you...
2•robtherobber•21m ago•0 comments

Pbgopy v0.4.0: Simple cross-device clipboard with history

https://github.com/nakabonne/pbgopy
1•nakabonne•22m ago•0 comments

Wipeout Clone Runs Native on ESP32-S3

https://hackaday.com/2026/04/29/wipeout-clone-runs-native-on-esp32-s3/
2•sohkamyung•23m ago•0 comments

Lectronz

https://lectronz.com/
1•irdc•23m ago•1 comments

Curious: How do you manage contract signature? Any winning process?

https://www.getprobo.com/blog/2026-04-24-how-we-automated-our-client-contract-process
1•arthurmyx•24m ago•1 comments

TimeCapsuleSMB: Hacking the Apple Time Capsule to Run Modern Samba

https://github.com/jamesyc/TimeCapsuleSMB
1•lproven•27m ago•0 comments

More Americans See Driverless Car Future; Few Show Interest

https://news.gallup.com/poll/708683/americans-driverless-car-future-few-show-interest.aspx
1•giuliomagnifico•27m ago•0 comments

China's Meta Backlash Renders Manus Model 'Officially Dead'

https://www.bloomberg.com/news/articles/2026-04-29/china-s-meta-backlash-renders-manus-model-offi...
1•helsinkiandrew•29m ago•0 comments

Niri Security Model

https://niri-wm.github.io/niri/Security-Model.html
2•luu•32m ago•0 comments

SnoreStop AI: Stop Snoring

https://apps.apple.com/gr/app/snorestop-ai-stop-snoring/id6761017053
2•SnoreStopAI•33m ago•0 comments

GraphOS – Visual runtime and debugger for AI agents (with local-first execution)

https://github.com/ahmedbutt2015/graphos
1•ahmedthefayyaz•34m ago•1 comments

Pgpulse – Autopilot for Postgres Observablity and monitoring platform

https://pgpulse.io/
1•pabanda•34m ago•1 comments

Seeking a human connection in the scam-infested hiring process

https://markoanastasov.com/signals/seeking-a-human-connection-in-the-scam-infested-hiring-process/
1•markoa•36m ago•0 comments

Continuing the story of early DOS development

https://opensource.microsoft.com/blog/2026/04/28/continuing-the-story-of-early-dos-development/
2•bananaboy•36m ago•0 comments

Python One go: Bootstrapped uncertainty quantification given observation matrix

https://github.com/msuzen/leymosun
1•northlondoner•37m ago•1 comments

Devin for CLI

https://cli.devin.ai/docs
1•teddyX•38m ago•1 comments

Orchestrating AI Code Review at Scale

https://blog.cloudflare.com/ai-code-review/
1•vinhnx•39m ago•0 comments

My Visitors Are Not All Human. That Is Fine

https://hoeijmakers.net/my-visitors-are-not-all-human-that-is-fine/
1•robhoeijmakers•40m ago•1 comments

Llama.cpp MIPS R8000 Kernel Running on an SGI Power Challenge from 1995

https://twitter.com/mov_axbx/status/2048656497370923470
2•MrBuddyCasino•40m ago•0 comments

Taking down a network with a TLS certificate: my RIPE NCC RPKI exploit chain

https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/
2•job•40m ago•0 comments

Robot golf vs. holes that keep getting harder [video]

https://www.youtube.com/watch?v=2OfjZ3ORJfc
2•7777777phil•41m ago•0 comments