Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions docs/threat-model.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@ To give a few more specific examples, here is a non-exhaustive list of scenarios
- Changing the code of `sync-team` or `team` to give themselves special permissions.
- Changing the code of CI workflows.
- Adding or modifying a file that affects what gets executed on CI. For example `.cargo/config.toml` (affects Cargo) or `rust-toolchain.toml` file (affects Rustup).
- Upgrading dependencies in `Cargo.lock` to a compromised version.

### Content attacks
The second category is "content attacks", which can be done without changing code, only by modifying the TOML data files. This kind of attack could be performed by a maintainer, unless we explicitly protect against it.
Expand Down