GCP - Source Repositories Unauthenticated Enum

Support HackTricks

Source Repositories

For more information about Source Repositories check:

Compromise External Repository

If an external repository is being used via Source Repositories an attacker could add his malicious code to the repository and:

  • If someone uses Cloud Shell to develop the repository it could be compromised

  • if this source repository is used by other GCP services, they could get compromised

Support HackTricks

Last updated