soc.octade.net is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
social@octade.net

Search results for tag #github

[?]F-Droid » 🌐
@fdroidorg@floss.social

@z428eu @kalivene How could a ragtag team of part time volunteer contributors from 6 continents submit to the legal undertaking of becoming a financial enterprise?

There's , , -fi, , , Sponsors, etc and crypto coins. If your favorite app developer does not yet support the one you like... feel free to ask them.

/PS: Keep an eye on and subscribe to our news via 😉

    [?]xoron :verified: » 🌐
    @xoron@infosec.exchange

    Local-Only File Encryption with JavaScript.

    I've been exploring the and I'm impressed!

    When combined with the , it offers a seemingly secure way to and files directly on your device. Think , but with !

    I know can have vulnerabilities since the code is served over the web, so I've my demo! You can check it out, and it should even work if on .

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for and purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like . It's just a to show what's possible with .

      CyberFrog boosted

      [?]jbz » 🌐
      @jbz@indieweb.social

      :tux: Gentoo Linux Begins Codeberg Migration In Moving Away From GitHub, Avoiding Copilot
      phoronix.com/news/Gentoo-Start

        [?]Timothy R. Butler » 🌐
        @trbutler@mastodon.faithtree.social

        Two observations from playing afresh with . coding has gotten almost uncannily good. It mimics my style and seems to anticipate where I’m going before my fingers can type it out.

        But, it can also be as dumb as a rock, making all these people “vibe coding” and unable to understand the code worrisome. I like it typing out what’s in my brain faster than my fingers can go, but it helps that I can look and say, “Wait a second here, that ISN’T what I was going to type and it’s a really, really bad idea.”

        (I’m using it on “auto” model selection, so a mix of )

          [?]⚯ Michel de Cryptadamus ⚯ » 🌐
          @cryptadamist@universeodon.com

          i generated a simple page that complements the other pages by just listing (and linking to) all the emails in the november document dump in chronological order: michelcrypt4d4mus.github.io/ep

          * Github: github.com/michelcrypt4d4mus/e
          * PyPi: pypi.org/project/epstein-files/

          screenshot of color highlighted epstein emails table

          Alt...screenshot of color highlighted epstein emails table

            [?]Profoundly Nerdy » 🌐
            @profoundlynerdy@bitbang.social

            Why did Gentoo choose Codebeg over alternatives?

              [?]Phillip Plays » 🌐
              @PhillipPlays@retro-gaiden.com

              Pearl v0.1.10 is out!

              This version lets you attach files to messages so Pearl can help you with to-do lists, meal planning, , and more! It also feature general usability improvements.

              Download on : github.com/pdschneider/Pearl/r

                [?]Whinery » 🌐
                @Whinery@undefined.social

                ... [SENSITIVE CONTENT]

                @nixCraft

                I hope quits soon!

                  [?]Mr. Lance E Sloan (IRL) 👤 [(Mr.-pronouns)] » 🌐
                  @sloanlance@mastodon.social

                  @dillo
                  This is the second post I've seen today about migrating away from . 👀

                    [?]Dillo browser » 🌐
                    @dillo@fosstodon.org

                    Migrating from GitHub to our self-hosted server. :blobcatcookienom:

                    I wrote a post about the current situation with and how we ended up self-hosting our own infrastructure to be robust against data loss. We now store all important data (including issues) in git repositories which are replicated accross and .

                    dillo-browser.org/news/migrati

                      [?]nullagent » 🌐
                      @nullagent@partyon.xyz

                      Running my NPM checks again today, I see eight remaining infected packages still circulating on the Microsoft owned platform.

                      Unlike nodejs package index socket.dev NPM does not show ANY security warnings on these package's pages.

                      It's pretty wild that these known compromised packages have been circulating for four days now with now response or action from Microsoft despite it being one of the largest security stories this month.

                        [?]nullagent » 🌐
                        @nullagent@partyon.xyz

                        Just finished writing another tool, now I can see NINE known compromised packages are still up for download on NPM! ⚠️

                        This tool crawls the list of known bad packages and downloads the latest bundle.

                        It then runs my other checks against the downloaded bundle and logs the results.

                        github.com/datapartyjs/walk-wi

                        ./is-npm-still-dangerous
Reads the data/infected-pkgs.txt
Downloads the latest package metadata for every known infected package
Downloads the current latest package.tgz
Uncompresses and scans the latest version using ./check-projects
Depending upon the scan result
./is-npm-still-dangerous

capacitor-voice-recorder-wav 6.0.3 - STILL COMPROMISED
haufe-axera-api-client 0.0.2 - STILL COMPROMISED
hyper-fullfacing 1.0.3 - STILL COMPROMISED
@ifelsedeveloper/protocol-contracts-svm-idl 0.1.2 - STILL COMPROMISED
my-saeed-lib 0.1.1 - STILL COMPROMISED
quickswap-ads-list 1.0.33 - STILL COMPROMISED
@seung-ju/react-native-action-sheet 0.2.1 - STILL COMPROMISED
tcsp 2.0.2 - STILL COMPROMISED
web-types-lit 0.1.1 - STILL COMPROMISED
web-types-lit 0.1.1 - STILL COMPROMISED
Found 9 npm-reports/npm-latest-bad.txt packages STILL compromised!

See npm-reports/npm-latest-bad.txt for full listing.
Warning - Most people probably don't need to run this. It causes a lot of NPM traffic. Warning - There's a few packages this fails to download and check (likely bc's they are hosted outside of NPMjs.org)

                        Alt..../is-npm-still-dangerous Reads the data/infected-pkgs.txt Downloads the latest package metadata for every known infected package Downloads the current latest package.tgz Uncompresses and scans the latest version using ./check-projects Depending upon the scan result ./is-npm-still-dangerous capacitor-voice-recorder-wav 6.0.3 - STILL COMPROMISED haufe-axera-api-client 0.0.2 - STILL COMPROMISED hyper-fullfacing 1.0.3 - STILL COMPROMISED @ifelsedeveloper/protocol-contracts-svm-idl 0.1.2 - STILL COMPROMISED my-saeed-lib 0.1.1 - STILL COMPROMISED quickswap-ads-list 1.0.33 - STILL COMPROMISED @seung-ju/react-native-action-sheet 0.2.1 - STILL COMPROMISED tcsp 2.0.2 - STILL COMPROMISED web-types-lit 0.1.1 - STILL COMPROMISED web-types-lit 0.1.1 - STILL COMPROMISED Found 9 npm-reports/npm-latest-bad.txt packages STILL compromised! See npm-reports/npm-latest-bad.txt for full listing. Warning - Most people probably don't need to run this. It causes a lot of NPM traffic. Warning - There's a few packages this fails to download and check (likely bc's they are hosted outside of NPMjs.org)

                          [?]nullagent » 🌐
                          @nullagent@partyon.xyz

                          Now that the acute phase is slowing there's a VERY important question...

                          What is the actual fucking value does Microsoft (a trillion dollar company) owning GitHub & NPM bring at all?

                          This shit was an absolute corporate buyout disaster. How the ever living fuck has microsoft owned NPM for FIVE years and still not done proper MFA requirements for publishing packages on NPM.

                          How the actual fuck are well known vulnerable packages STILL being propagated by NPM.

                          A three panel meme

Top - "Hack the planet" shouts a man being forced into a police car

Center - A hacker in a ski mask at a computer works. "Some dune nerd"

Bottom - "Wait, no not like that!" -Microsoft

                          Alt...A three panel meme Top - "Hack the planet" shouts a man being forced into a police car Center - A hacker in a ski mask at a computer works. "Some dune nerd" Bottom - "Wait, no not like that!" -Microsoft

                            [?]nullagent » 🌐
                            @nullagent@partyon.xyz

                            These sorts of NPM worms have been around for a LONG time.

                            It's typically due a common practice of low 2fa opt-in on NPM accounts.

                            So be sure to setup NPM 2FA if you're a package maintainer do that asap!

                            A lesser known NPM capability is that you can disable install time scripts. This may break some packages but its worth a try to see if your projects can work with out any install scripts. 👇🏿

                            blog.npmjs.org/post/1417028810

                            Package install scripts vulnerability
Disclaimer: we had been told this vulnerability would be disclosed on Monday, not Friday, so this post is a little rushed and may be edited later.

As disclosed to us in January and formally discussed in CERT vulnerability note VU#319816, it is possible for a maliciously-written npm package, when installed, to execute a script that includes itself into a new package that it then publishes to the registry, and to other packages owned by that user.

npm cannot guarantee that packages available on the registry are safe. If you see malicious code on the registry, report it to support@npmjs.com and it will be taken down.

How to protect yourself
If you are installing a package that you do not trust, you can avoid this vulnerability by running

npm install --ignore-scripts

If you wish to never run scripts at install time, you can instead run

npm config set ignore-scripts true

Either or both of these steps will prevent you from spreading a worm at install time.

If you install a package that contains malicious code and then execute it (e.g. by require()ing it into your code) it could still perform malicious actions. You should not execute any software downloaded from the Internet if you do not trust it, including software downloaded from npm.

                            Alt...Package install scripts vulnerability Disclaimer: we had been told this vulnerability would be disclosed on Monday, not Friday, so this post is a little rushed and may be edited later. As disclosed to us in January and formally discussed in CERT vulnerability note VU#319816, it is possible for a maliciously-written npm package, when installed, to execute a script that includes itself into a new package that it then publishes to the registry, and to other packages owned by that user. npm cannot guarantee that packages available on the registry are safe. If you see malicious code on the registry, report it to support@npmjs.com and it will be taken down. How to protect yourself If you are installing a package that you do not trust, you can avoid this vulnerability by running npm install --ignore-scripts If you wish to never run scripts at install time, you can instead run npm config set ignore-scripts true Either or both of these steps will prevent you from spreading a worm at install time. If you install a package that contains malicious code and then execute it (e.g. by require()ing it into your code) it could still perform malicious actions. You should not execute any software downloaded from the Internet if you do not trust it, including software downloaded from npm.

                              [?]nullagent » 🌐
                              @nullagent@partyon.xyz

                              Updated my listing of Sha1-Hulud detection tools.

                              I now have found at least 12 other tools for detecting Sha1-Hulud compromise on your dev box and in infrastructure.

                              github.com/datapartyjs/walk-wi

                              Similar Sha1-Hulud 11/24/25 Detection Tools
Links to other projects provided with no warranty express or implied.

https://github.com/TimothyMeadows/sha1hulud-scanner
https://github.com/mottibec/sha1hulud-scanner
https://github.com/gensecaihq/Shai-Hulud-2.0-Detector
https://github.com/tprinty/sha1hulud-action-detector
https://github.com/da1z/amihulud
https://github.com/bobberg/sha1-hulud-folder-checker
https://github.com/servusdei2018/sha1-halud-scan
https://github.com/kevcooper/fremkit
https://github.com/ysskrishna/shai-hulud-detector
https://github.com/Cobenian/shai-hulud-detect
GitHub Scanners
https://github.com/ysskrishna/shai-hulud-detector
panther-labs/panther-analysis#1826

                              Alt...Similar Sha1-Hulud 11/24/25 Detection Tools Links to other projects provided with no warranty express or implied. https://github.com/TimothyMeadows/sha1hulud-scanner https://github.com/mottibec/sha1hulud-scanner https://github.com/gensecaihq/Shai-Hulud-2.0-Detector https://github.com/tprinty/sha1hulud-action-detector https://github.com/da1z/amihulud https://github.com/bobberg/sha1-hulud-folder-checker https://github.com/servusdei2018/sha1-halud-scan https://github.com/kevcooper/fremkit https://github.com/ysskrishna/shai-hulud-detector https://github.com/Cobenian/shai-hulud-detect GitHub Scanners https://github.com/ysskrishna/shai-hulud-detector panther-labs/panther-analysis#1826

                                [?]nullagent » 🌐
                                @nullagent@partyon.xyz

                                GitHub has almost finished taking down the stolen data posted by the Sha1-Hulud npm/github worm. I only see about 400 repos remaining of the around 23k created by the worm.

                                This was the most visible evidence of the exploit, just because we can't clearly see the worm's uploads doesn't mean the worm is totally dead yet.

                                  [?]nullagent » 🌐
                                  @nullagent@partyon.xyz

                                  I spent more time searching for other Sha1-Hulud detection tools and found four more bringing it to 6 scanners (5 in nodejs).

                                  Linked them all from my readme in case those work better for you.

                                  Best way to beat a worm like this is to keep scanning and keep an eye out for the attacker to try and evade all of our tools.

                                  By using more than one hopefully we make the attackers job harder to evade all of us.

                                  github.com/datapartyjs/walk-wi

                                    [?]nullagent » 🌐
                                    @nullagent@partyon.xyz

                                    Checking back in on my GitHub query and the stolen data is STILL showing up on github.

                                    I can tell github looks to be deleting the repos a -little- bit faster than they are created. There's still over 15k repos full of stolen credentials and PII available for public download.

                                    I've also noticed some new behavior I hadn't seen before where the worm is now making commits look like Linus Torvalds wrote them. Clearly a delay tactic.

                                    partyon.xyz/@nullagent/1156078

                                      [?]nullagent » 🌐
                                      @nullagent@partyon.xyz

                                      Woot ok now that I have the dependency graph crawled I can just ship the listing of known bad NPM packages and just compare directly against that.

                                      I updated the scanning script to alert if you have -any- version of an infected package.

                                      You're gonna want to be very careful if you're not infected but have one of these dependencies present.

                                      github.com/datapartyjs/walk-wi

                                        [?]nullagent » 🌐
                                        @nullagent@partyon.xyz

                                        At the end of scanning for obvious compromise the `check-projects` script then builds a listing of all of your dependencies and all of the versions your project files mention.

                                        You can find that info under `reports/`

                                        I'm currently working on improving the `check-projects` script so that it will alert you if ANY of your package.json or package-lock.json mentions a known infected package.

                                          [?]nullagent » 🌐
                                          @nullagent@partyon.xyz

                                          I've spent the last few hours writing down my scripts for detecting this so you can use them!

                                          I'm hitting on two or three ways to detect it and will be adding more.

                                          Watching the attack running I can see developers all over the world still doing their morning `npm i` and getting owned 😭

                                          Maybe let the node developers in your life know about this tool 👇🏿

                                          github.com/datapartyjs/walk-wi

                                            [?]nullagent » 🌐
                                            @nullagent@partyon.xyz

                                            First pass is super simple and just looks for the file names & package.json signature for signs of infection anywhere in the path you tell it to search.

                                            If it sees anything fishy it tells you where and stops until you've read the alert.

                                            Oh and this only uses bash, sed, awk, grep, curl, and jq. So no npm, node or other big supply chains 🥴

                                            github.com/datapartyjs/walk-wi

                                              [?]nullagent » 🌐
                                              @nullagent@partyon.xyz

                                              Taking a second to understand the attack rate. I constructed this query below which shows you essentially an up to date listing of developers/code that's been compromised.

                                              Once your box is infected and PII data has been found the worm then uses your github credentials to upload that content so ANYONE can now steal your credentials.

                                              I'm finding multiple repos being popped every minute. This is an extremely active attack right now.

                                              github.com/search?q=%22Sha1-Hu

                                                [?]nullagent » 🌐
                                                @nullagent@partyon.xyz

                                                There's an active nodejs supply chain attack going around.

                                                From the looks of it many of these compromised packages have been mitigated but quite a few have not.

                                                helixguard.ai/blog/malicious-s

                                                  [?]David - Forking Mad » 🌐
                                                  @daj@gofer.social

                                                  @jorijn all the cool kids don't use #github anyway.

                                                    [?]adison verlice » 🌐
                                                    @adisonverlice@tweesecake.social

                                                    if not, I shall get to help me fix it, as it is my go-to considering I don't have web developing skills yet. I know some html but not enough clearly lol

                                                      [?]Lanie » 🌐
                                                      @RareBird15@allovertheplace.ca

                                                      🧠📚 Been deep in the weeds refining my APA 7 student paper template—fully accessible, screen reader-friendly, and powered by LaTeX + Makefile automation. It’s designed for blind students, accessibility advocates, and anyone who wants a clean, reproducible academic workflow. Note that it doesn't use the apa7 class since that wouldn't allow the PDF to be tagged for accessibility.

                                                      ✅ Includes:

                                                      • Automated PDF builds with BibLaTeX
                                                      • Submission and status reporting targets
                                                      • Sample references. Bib
                                                      • Screen reader-friendly README

                                                      Built and tested across Raspberry Pi, Fedora Remix, and openSUSE with WSL integration. If you’re navigating academic publishing with accessibility in mind, I made this for you.

                                                      🔗 Check it out on GitHub

                                                        [?]#FreeSchool <---> Hashtag » 🌐
                                                        @freeschool@qoto.org

                                                        @micr0 Hi

                                                        ⚠️ I replied to the email but with a (so not "yes" or "allow") and it accepted that as consent :)

                                                        🎈 So maybe that needs checking better... as I didn't really consent and more wanted to know more!

                                                        So I wanted to ask before the consent something - the question was:

                                                        ❓ "What do you use for automating the ?"

                                                        ❓ "How does it work as a automated process?"

                                                        This could go in the auto-email same to with the link & while asking for .

                                                        Maybe it's not in or as clearly either so feels like it is important enough to be said how it's done and the process magic... as I have no idea!...

                                                        Thanks a lot for ...

                                                          🗳

                                                          [?]Newsmast Foundation » 🌐
                                                          @newsmast@backend.newsmast.org

                                                          Do you have a GitHub account?

                                                          One of the conversations at revolved around accessibility for non-techies in the Open Social Web. One of the barriers raised was the reliance on spaces built for developers, such as GitHub. So, we're wondering, how many people on the Fediverse have a GitHub account?

                                                          Please boost so more people can interact!

                                                          I do:274
                                                          I don't:144
                                                          I do, but don't use it:147
                                                          I don't, but I would:3

                                                            [?]Naty » 🌐
                                                            @eclecticpassions@fosstodon.org

                                                            New on ✍️

                                                            ➡️ burgeonlab.com/blog/github-sty

                                                            Wrote a guide on how to make your own contribution calendar dupe for your blog, using the really awesome JS Library.

                                                            The will display the days of a year that a post was published and the will show you if the post was long or short with the word count.

                                                            If you give it a try, please let me know. I'm curious!

                                                              [?]Colin Cogle :verified: » 🌐
                                                              @colin@mastodon.colincogle.name

                                                              Help, I need a code signing certificate that won't bankrupt me.

                                                              Three years ago, I paid $100 for a three-year code signing certificate. I've signed all my open-source projects' releases with it. Now that it's renewal time, Certera (SignMyCode.com) wants almost $700 for the same three-year certificate (excluding the mandatory HSM purchase, which I am totally on board with).

                                                              I write silly C and PowerShell code, and I timestamp my signatures so that they're perpetually valid. My PowerShell Gallery stuff, as well as binaries of aprs-weather-submit on Windows and macOS, are all signed and hashed (but not notarized by Apple, because that's another $99 a year for something that feels done unless Bob Bruninga's followers are thinking about APRS 2.0).

                                                              If I can't find a solution, anything I write or update in the future will have to be released as unsigned unless I half-ass something (like the Notepad++ developer using self-signed certs -- semi-dangerously clever). $100 every three years, fine. $700 every three years, and I'll do it if my three fans click my Buy Me A Coffee link over and over.

                                                              Is there any CA out there that will offer open-source, not-for-profit developers like me a chance to get globally-trusted code signing certificates? I don't think SigStore ever took off (sadly), and even if it did, I don't think it's part of the Microsoft Authenticode program.

                                                              -Weather-Submit

                                                                [?]Naty » 🌐
                                                                @eclecticpassions@fosstodon.org

                                                                Worked on a GitHub style heatmap calendar for my Hugo blog! Excited to share how I did it soon. 😇

                                                                Mobile view of a calendar grid heatmap (github style) for a Hugo blog, with colour ranges based on the word count of the posts.

                                                                Alt...Mobile view of a calendar grid heatmap (github style) for a Hugo blog, with colour ranges based on the word count of the posts.

                                                                  [?]Kevin Karhan :verified: » 🌐
                                                                  @kkarhan@infosec.space

                                                                  @antijingoist @resingm ???

                                                                  Either way, I had cases of vandalism and harrassment and nit only dwalt wih them quickly but has working tools to ban offending accounts quickly.

                                                                    Back to top - More...