Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A malicious employee can simply send the code to the competitor. There is no need to set up an account that is controlled by the competitor to evade access protections.


I think the point is that in this way it can happen without the employee intending it to happen.


How though? Can someone explain a situation where a GH organisation automatically gets access to another organisations' repos through a shared individual member?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: