Add SHA-256 support for git commit hashes #154056
Replies: 5 comments 3 replies
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
I wasn't aware of the already existing SHA-1 collision support created by Github. It's very interesting read and AFAIK it seems that using SHA-1 collisions is not possible: |
Beta Was this translation helpful? Give feedback.
-
|
Is anyone aware of a git hook script I could use to analyse I think this would make it much safer to use 3rd party GitHub Actions. So automating this process: - - uses: actions/checkout@v4;
+ - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 #v4; |
Beta Was this translation helpful? Give feedback.
-
|
Any ideas if |
Beta Was this translation helpful? Give feedback.
-
|
FWIW I did a couple of tests and it seems SHA-256 is supported on both Gitlab and Codeberg. Of course it needs to be enabled when initializing the repo but from my PoV it's GitHub that's lagging on this important feature... |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
Hey,
When is Github enabling support for git repositories with sha256 commits aka
--object-format=sha256?I'm writing this In the light of recent malicious takeover of https://github.com/tj-actions/changed-files. See more in HN.
The best practice to securely using 3rd party actions in GitHub Actions is to:
I'm afraid that creating SHA-1 collisions will become more and more affordable and wish to start using sha256 commits sooner than later.
Here's the blog post from Google from 2017 where they demostrated this issue in action.
Steps to reproduce the issue
Currently this is supported in git but not in GitHub:
Also see more about the the topic in Stack overflow.
Beta Was this translation helpful? Give feedback.
All reactions