Click any tag below to further narrow down your results
Links
Greptile automates code review in GitHub and GitLab, providing context-aware comments on pull requests. Teams can customize coding standards and track rule effectiveness to improve code quality and speed up merges. It supports multiple programming languages and offers self-hosting options.
V0 has evolved to streamline the coding process for non-engineers, enabling them to create production-ready applications directly from existing codebases. It addresses issues with vibe coding, such as security flaws and inefficient prototyping, by integrating tools that allow teams to ship features quickly and safely.
Security flaws in npm's defenses against supply-chain attacks allow hackers to bypass protections through Git dependencies. Although other package managers have patched their vulnerabilities, npm rejected a vulnerability report from Koi Security, claiming users must vet package content themselves.
Commit Stomping is a technique used to manipulate Git commit timestamps, misleading observers about when changes were made. This method can obscure the true timeline of code changes, complicating audits and incident investigations, and poses significant risks in software supply chain security. The article discusses how to execute this technique, its implications, and strategies for detection and prevention.
A comprehensive guide for creating Debian packages in 2025 using Git, emphasizing the importance of preserving upstream Git history for improved software provenance and supply-chain security. The article details an optimal workflow for packaging, including using Git for version control, following DEP-14 conventions, and leveraging Salsa for CI and peer reviews, illustrated through the example of packaging the Entr command-line tool.
Sketchy is a cross-platform security scanner designed to identify potential risks in GitHub repositories, packages, or scripts before installation. It highlights various security concerns, including code execution patterns and credential theft, helping users avoid malicious software. The tool is open-source and encourages users to audit its code and report any malware findings.
The article explores the benefits and considerations of hosting personal Git repositories, discussing various hosting solutions and the implications for developers. It highlights the importance of control over one's code and the potential challenges of self-hosting. Additionally, it touches on security and backup strategies to ensure data integrity.