
The GITHUB is presenting a set of defense against the supply-series attacks on the stage, causing several large-scale incidents recently.
Notable cybercatx that began with a compromise with Github Repository and then spread to NPM, in late August, “S1ngularity” attack, “Ghostection” campaign in early September, and Worm-style campaign dubbed “shay-hulud” since last week.
The attacks led to a compromise of thousands of accounts and private repository, theft of sensitive data and significant therapeutic costs.
Although Github quickly responded to reduce the impact of these events, the developer platforms accept that strong active measures will be more effective.
To reduce these risks, Github announced This will gradually implement the following measures:
- Local publication requires two-factor authentication (2FA).
- Apply a granular token with a lifetime of 7-day.
- Encourage expansion and adopt Reliable publication,
- Remove classic tokens and TOTP 2FA (migrating for Fido-based 2FA).
- Short the end of the publishing tokens.
- Default publication access to the tokens.
- Remove the option to bypass 2FA for local publication.
Reliable publications, which have already been adopted in many ecosystems, are strongly encouraged as it eliminates the need to manage the API tokens in the build system.
NPM maintenance is advised to immediately switch to reliable publication, as well as apply 2FA for publication and writing, and use webauth instead of time-based one-time password (TOTP) for 2FA.
The code hosting and cooperation platform will gradually roll out these changes and provide the documents and migration guides required to reduce the disruption in the existing workflows.
The declaration also emphasized that ecosystem security is a collective duty, and developers are expected to take action themselves to reduce supply risks by adopting better security options available on stage.
Ruby Central also announced Rubygems package manager’s tight governance to improve its supply-series safety.
The ecosystem was recently suffering from similar problems, such as a campaign with 60 malicious ruby gems that were downloaded 275,000 times, and typing the Fastlane project for a telegram.
Only Ruby Central Staff will conduct admin access until the new regime models and the underlying policies are finalized.
The announcement promises a change for a more transparent, community-centric model. A Q&A set for today is expected to clarify the concerns related to sudden action, which were depicted as a raw acquisition to many Ruby community members.


