Securing the world's software, together
Securing the world's software, together
GitHub Security Lab’s mission is to inspire and enable the community to secure the open source software we all depend on.
![](/assets/img/marketing/hero.png)
What we do
![Find vulnerabilities](/assets/img/icons/existing_vulnerability.png)
Our researchers find and report new vulnerabilities in the open source projects everyone relies on.
![Educate the community](/assets/img/icons/learning_github.png )
We share our research through proof-of-concepts, articles, tutorials, conferences and community events.
![Amplify security research](/assets/img/icons/amplify-research.png )
We scale the security research of our community by performing Variants Analysis for open source projects with CodeQL. Visit our CodeQL Wall of Fame.
![Notify the ecosystem](/assets/img/icons/cve_record.png )
We curate a database of CVEs and security advisories to notify open source developers and maintainers.
Our principles
![Empower others](/assets/img/icons/empower-others.png)
Make securing open source easy for developers and maintainers.
![Foster collaboration](/assets/img/icons/community_actions.png )
Build a community of security researchers to serve the global open source community.
Vulnerabilities we've disclosed so far
-
Checkout and execution of untrusted code in the GitHub workflows of JupyterLab - CVE-2024-39700
-
Actions expression injection and artifact poisoning in Quarkus
-
RCE and blind SSRF in Streamlit-geospatial - CVE-2024-41112, CVE-2024-41113, CVE-2024-41114, CVE-2024-41115, CVE-2024-41116, CVE-2024-41117, CVE-2024-41118, CVE-2024-41119, CVE-2024-41120
-
Actions expression injection in Discord.js
-
Unsafe YAML Deserialization in ngrinder
Meet the team
Catching up on all the hacking that I should have done in the 1990s