heroui logo

GitHub Malicious Comment/Review Content

Panther Rules

View Source
Summary
The GitHub Malicious Comment/Review Content detection rule is designed to identify potentially harmful patterns in comments and reviews made within GitHub repositories. This rule primarily targets malicious patterns that could result in bash injection attacks or social engineering attempts. These patterns might include command substitution or other shell commands embedded in comments or reviews on issues and pull requests. Specifically, it looks for commands that developers might mistakenly run based on misleading commentary, leveraging the principle that while comments themselves can’t execute code, they can deceive developers into acting on them. Examples of detected patterns include commands that utilize `curl`, `wget`, and `eval` statements, which are known to be commonly associated with exploitation techniques in the software supply chain. Additionally, the rule references the Nx vulnerability (GHSA-cxm3-wv7p-598c) as a notable case. The severity of detection is rated as medium, indicating the potential risk and impact of successful exploitation if such comments are executed by gullible developers.
Categories
  • Web
  • Cloud
  • Application
Data Sources
  • Web Credential
  • Application Log
  • User Account
ATT&CK Techniques
  • T1195.002
  • T1566
Created: 2025-11-13