GCP - Source Repositories Unauthenticated Enum

{{#include ../../../banners/hacktricks-training.md}}

Source Repositories

For more information about Source Repositories check:

{{#ref}}
../gcp-services/gcp-source-repositories-enum.md
{{#endref}}

Compromise External Repository

If an external repository is being used via Source Repositories an attacker could add his malicious code to the repository and:

  • If someone uses Cloud Shell to develop the repository it could be compromised
  • if this source repository is used by other GCP services, they could get compromised

{{#include ../../../banners/hacktricks-training.md}}