(Serious Issue Of Github) Commit Timestamp Manipulation via Local System Clock Allows Fabricated Historical Commit Records #182222
Replies: 2 comments
-
|
🕒 Discussion Activity Reminder 🕒 This Discussion has been labeled as dormant by an automated system for having no activity in the last 60 days. Please consider one the following actions: 1️⃣ Close as Out of Date: If the topic is no longer relevant, close the Discussion as 2️⃣ Provide More Information: Share additional details or context — or let the community know if you've found a solution on your own. 3️⃣ Mark a Reply as Answer: If your question has been answered by a reply, mark the most helpful reply as the solution. Note: This dormant notification will only apply to Discussions with the Thank you for helping bring this Discussion to a resolution! 💬 |
Beta Was this translation helpful? Give feedback.
-
|
This needs to be flagged and given more attention. You should also submit this bug thrhough their Bug Bounty Program or maybe even open a direct support ticket with github directly. I agree this IS SERIOUS. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Question
Body
Summary
I identified a vulnerability in GitHub’s commit timestamp validation logic where GitHub accepts commit timestamps based solely on the client’s local system clock without server-side verification. By changing the system date/time on a local machine before creating and pushing commits, it is possible to generate commits that appear to originate in the past or future. GitHub displays these manipulated timestamps in the repository history without distinguishing them from legitimate timestamps, potentially allowing commit history falsification.
Impact
This issue enables users to fabricate misleading chronological commit history. Potential abuses include:
Steps to Reproduce
Expected Behavior
GitHub should validate or normalize commit timestamps (e.g., using server time, trusted NTP, or flagging anomalous timestamps) to prevent arbitrary manipulation.
Actual Behavior
GitHub accepts the client-side timestamp verbatim, allowing creation of commits dated inaccurately relative to real time.
Proof of Concept
Example commit created with intentionally modified system time to demonstrate timestamp fabrication (details can be provided privately if required).
Severity Justification
This vulnerability affects:
Because commit history is often used as evidence or as a timeline of authorship, the ability to falsify it without detection poses reputational, legal, and workflow risks.
Beta Was this translation helpful? Give feedback.
All reactions