GCP - Source Repositories Unauthenticated Enum
Source Repositories
For more information about Source Repositories check:
Compromise External Repository
If an external repository is being used via Source Repositories an attacker could add his malicious code to the repository and:
If someone uses Cloud Shell to develop the repository it could be compromised
if this source repository is used by other GCP services, they could get compromised
Last updated