GCP - Source Repositories Unauthenticated Enum
Reading time: 1 minute
tip
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Source Repositories
For more information about Source Repositories check:
GCP - Source Repositories Enum
Compromise External Repository
If an external repository is being used via Source Repositories an attacker could add his malicious code to the repository and:
- If someone uses Cloud Shell to develop the repository it could be compromised
- if this source repository is used by other GCP services, they could get compromised
tip
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.