1 min read

GitHub Improves Policies to Better Distinguish Malware or Vulnerability Research from the Rest

Silviu STAHIE

June 07, 2021

GitHub Improves Policies to Better Distinguish Malware or Vulnerability Research from the Rest

Following a public debate, GitHub changed its policies regarding exploits, malware and vulnerability research so that the company’s position is much clearer when it comes to action and its responsibilities.

There’s no denying that GitHub’s usefulness far outweighs that of the potential harm that it can generate. The platform’s often been used in various malware campaigns, but GitHub is trying to change some policies to allow users, researchers and the platform itself to manage the content better.

After the community weighed in on GitHub’s proposal, new policies have come into effect, one of which stands out:

“We explicitly permit dual-use security technologies and content related to research into vulnerabilities, malware, and exploits,” state the new policies. “We understand that many security research projects on GitHub are dual-use and broadly beneficial to the security community. We assume positive intention and use of these projects to promote and drive improvements across the ecosystem. This change modifies previously broad language that could be misinterpreted as hostile toward projects with dual-use, clarifying that such projects are welcome.”

The second point is almost as crucial, as GitHub states it will not allow its platform to be used in “unlawful attacks that cause technical harm, which we’ve further defined as overconsumption of resources, physical damage, downtime, denial of service, or data loss.” The precise definition of what constitutes an attack no longer leaves room for interpretation.

GitHub also made it a lot clearer that an appeals and reinstatement process is available for users who have had their projects suspended. The company also has a system in place to let parties resolve disputes before the incident is elevated to be arbitrated by GitHub.

These policies should make it easier to distinguish real security projects from malicious ones, making it more difficult for threat actors to hide behind a veil of research.

tags


Author



Right now

Top posts

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

July 29, 2021

5 min read
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Fraudsters Impersonate Registered Brokers to Swindle Investors, the FBI Warns Fraudsters Impersonate Registered Brokers to Swindle Investors, the FBI Warns
Alina BÎZGĂ

August 03, 2021

2 min read
Brits Lost Over £2.5 Million in Pet Fraud Since 2020 Brits Lost Over £2.5 Million in Pet Fraud Since 2020
Alina BÎZGĂ

August 02, 2021

2 min read
Threat Actors Impersonate Standard Chartered Bank To Spread FormBook Malware Threat Actors Impersonate Standard Chartered Bank To Spread FormBook Malware
Alina BÎZGĂ

July 28, 2021

2 min read