GCP - Source Repositories Unauthenticated Enum
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
For more information about Source Repositories check:
GCP - Source Repositories EnumIf an external repository is being used via Source Repositories an attacker could add his malicious code to the repository and:
If someone uses Cloud Shell to develop the repository it could be compromised
if this source repository is used by other GCP services, they could get compromised
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)