Remix.run Logo
layer8 6 days ago

Auditors?

dathinab 6 days ago | parent [-]

yes auditors from a security audit

whimsicalism 6 days ago | parent [-]

you could barely convince your auditors that using github was okay? well, my opinion of security audits is reaffirmed

anileated 6 days ago | parent | next [-]

Security audits are just theater. If they were not, you could not ever convince them that using a platform feeding unlicensed source (including apparently from private repositories) to their commercial LLM is ever a pass.

shortrounddev2 6 days ago | parent | next [-]

Absolute theater. They do nothing to validate that you are compliant with whatever ISO cert you're pursuing. They make you install a root cert on your macbook and they say that's good enough to ensure compliance. You just attest that you don't do stupid shit like committing directly to master or testing in production and they believe you

dathinab 6 days ago | parent | next [-]

> compliant with whatever ISO cert you're pursuing

ISO cert compatibility audits are very different from a proper security audit.

And weather they do anything to check if depends on which you high, many of the slightly more expensive ones have the reputation to be "fast" and "overlook most issues".

But that doesn't apply to all security audits (but most audits for ISO compatibility, like really it's bad).

Anyway see my way to long answer about the on a sibling comment.

shortrounddev2 5 days ago | parent [-]

I'm certain there are good firms out there which will actually give you a legit audit and make recommendations. But if the client is not actually interested in security, there will always be unscrupulous firms who will essentially sell you an ISO cert for no effort required. In my experience, most medium to small sized companies place little value in security

UK-AL 6 days ago | parent | prev [-]

People test in production in all the time via Canary releases.

dathinab 6 days ago | parent | prev | next [-]

> Security audits are just theater.

It really depends on you auditor, audit approach and goals.

There are many audit companies which have a "under the hand" reputation of not properly looking and being easy to convince that you are secure, naturally at a above average audit cost (same but worse btw. for certificates showing compatibility with industry standards).

So if the audit was paid for by the company themself you can't trust it at all (which doesn't mean the company wanted to hide anything, this "bad" audit companies also tend finish the audit fast. So sometimes companies go for it, even if they don't have anything to hide).

Similar sometimes audit companies ask if they can audit you, this is for boosting their publicity using your name. This can easily turn into a "one hand washes the other" situation where they won't overlook massive issues, but still judge issues leniently.

Lastly there are some automated partial audit services which scan you public APIs/websites etc. Realistically they tend to be kinda dump, and might tell you they find a medium issue because (no joke) your REST API allows PUT and DELETE (1). Still I now take them a bit more serious after they pointed out, that there was a configuration error of a web gateway leading to some missing security headers.

(1: There is some history behind that, it's still dump for 90% of REST APIs)

Anyway, the situations so far are security audits which are at least 50% theater. BUT if a huge customers fully pays a audit company with a good/strict reputation then it often really isn't a security theater and can be quite a bad surprise if you company isn't prepared (because you have to fix so much). Like such reviews tend to not only be focused at your deployment or code but the whole software live cycle, including fun questions like "what measurements have you taken in case one of your developers tries to inject a supply chain attack" (which to be clear don't need to have perfect answers, just good enough, and most importantly clear and well documented).

marcosdumay 6 days ago | parent | prev | next [-]

From a company with a long history of leaking private data... That AFAIK never even claimed to have fixed their side of the Solar Winds issue...

whimsicalism 6 days ago | parent | prev [-]

from private repos? they explicitly say they do not

https://www.copilot.live/blog/does-github-copilot-use-your-c...

anileated 4 days ago | parent [-]

Check ToS.

whimsicalism 4 days ago | parent [-]

https://docs.github.com/en/site-policy/privacy-policies/gith...

yes, what i said

anileated 4 days ago | parent [-]

The link you posted is not ToS.

https://docs.github.com/en/site-policy/github-terms/github-t...

(The link I posted is also not the proper ToS, it is more of an abridged version. They made the actual ToS somewhat hard to find and I cannot be bothered.)

whimsicalism 4 days ago | parent [-]

the terms of service links to the privacy policy to explain how private repos are treated, the privacy policy is equally binding. from your link:

> Short version: We treat the content of private repositories as confidential, and we only access it as described in our Privacy Statement—for security purposes, to assist the repository owner with a support matter, to maintain the integrity of the Service, to comply with our legal obligations, if we have reason to believe the contents are in violation of the law, or with your consent.

anileated 3 days ago | parent [-]

I think it is safe to assume that more generous (for them) interpretation is the one that will be used by any big company. My link:

> You grant us and our legal successors the right to store, archive, parse, and display Your Content, and make incidental copies, as necessary to provide the Service, including improving the Service over time.

> parse it into a search index or otherwise analyze it on our servers

This is an “AI” platform now. “Improving the service” means that. “With your consent” means you have accepted the ToS (which by the way can be changed at any point and your continued use of the service means you consent to it).

dathinab 6 days ago | parent | prev [-]

we are EU based and have besides other attorney customers.

Cloud Act and more then just one or two cases of the US engaging in industry espionage against their allies(1) makes it a high legal liability to use more or less any service from a US company even if it's in the EU and a EU daughter company

On GitHub we only have some code, which always anyway goes through additional testing and analysis before hitting production, this is why it's barely okay. No code from GitHub directly goes to production.

The only reason we ever where on GitHub is because we didn't always had sensitive customers and switching CI over is always a pain.

So I don't know if imply them being incompetent for allowing GitHub or for wanting to not allow it, but both point have very good reasons.

(1): And I mean cases before Trump, the US (as in top government, not people) was always a highly egoistic, egocentric ally which never hesitated to screw over their allays when it came to economical benefits. The main difference is that in the past the US cared (quite a bit) about upholding a image of "traditional" values like honesty, integrity and reliability. Especially when it would affect their trade routes.