Securing the world's software, together
Securing the world's software, together
GitHub Security Lab’s mission is to inspire and enable the community to secure the open source software we all depend on.
![](/assets/img/marketing/hero.png)
What we do
![Find vulnerabilities](/assets/img/icons/existing_vulnerability.png)
Our researchers find and report new vulnerabilities in the open source projects everyone relies on.
![Educate the community](/assets/img/icons/learning_github.png )
We share our research through proof-of-concepts, articles, tutorials, conferences and community events.
![Amplify security research](/assets/img/icons/amplify-research.png )
We scale the security research of our community by performing Variants Analysis for open source projects with CodeQL. Visit our CodeQL Wall of Fame.
![Notify the ecosystem](/assets/img/icons/cve_record.png )
We curate a database of CVEs and security advisories to notify open source developers and maintainers.
Our principles
![Empower others](/assets/img/icons/empower-others.png)
Make securing open source easy for developers and maintainers.
![Foster collaboration](/assets/img/icons/community_actions.png )
Build a community of security researchers to serve the global open source community.
Vulnerabilities we've disclosed so far
-
Path traversal in yt-dlp leading to RCE - CVE-2024-38519
-
Path injection, Cross-Site Scripting (XSS) and CORS misconfiguration in Flowise - CVE-2024-36420, CVE-2024-36421, CVE-2024-36422, CVE-2024-36423, CVE-2024-37145, CVE-2024-37146
-
GitHub Actions expression injection in BioDrop
-
Insufficient markdown sanitization in nuget.org - CVE-2024-37304
-
Remote code execution (RCE) in UI for Apache Kafka - CVE-2023-52251, CVE-2024-32030
Meet the team
Catching up on all the hacking that I should have done in the 1990s