Просмотр исходного кода

dev: .pre-commit-config.yaml: git:// -> https:// (#24994)

A malicious actor on an insecure network could MITM the hooks download during initial setup and run arbitrary code on a developer's machine. Using https the risk is limited to the owners of the pre-commit GitHub account and GitHub itself (and the Web PKI system).
Alex Xu 3 лет назад
Родитель
Сommit
1e822ccbbc
1 измененных файлов с 1 добавлено и 1 удалено
  1. 1 1
      .pre-commit-config.yaml

+ 1 - 1
.pre-commit-config.yaml

@@ -65,7 +65,7 @@ repos:
       exclude: 'src/sentry/templates/sentry/reprocessing-script.sh'
       types: [shell]
 
--   repo: git://github.com/pre-commit/pre-commit-hooks
+-   repo: https://github.com/pre-commit/pre-commit-hooks
     rev: v3.4.0
     hooks:
     - id: check-case-conflict