GCP - Source Repositories Unauthenticated Enum

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

Source Repositories

For more information about Source Repositories check:

Compromise External Repository

If an external repository is being used via Source Repositories an attacker could add his malicious code to the repository and:

  • If someone uses Cloud Shell to develop the repository it could be compromised

  • if this source repository is used by other GCP services, they could get compromised

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

Last updated