You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
gx_output.r_log(f"A release was created by {release.get('author').get('login')} at {release.get('created_at')}: {release.get('html_url')}", rtype="releases")
243
+
ifrelease.get('author') ==None:
244
+
author="NO_USERNAME"
245
+
else:
246
+
author=release.get('author').get('login')
247
+
248
+
release_authors[author] +=1
249
+
gx_output.r_log(f"A release was created by {author} at {release.get('created_at')}: {release.get('html_url')}", rtype="releases")
245
250
iflen(release.get('assets')) >0:
246
251
# This release has assets other than frozen code. Let's check if updated_at differs from created_at
247
252
# Which may be an indicator of a compromised release by a malicious actor updating binaries.
248
253
forassetinrelease.get('assets'):
249
-
uploaded_by=asset.get('uploader').get('login')
254
+
ifasset.get('uploader') ==None:
255
+
uploaded_by="NO_USERNAME"
256
+
else:
257
+
uploaded_by=asset.get('uploader').get('login')
250
258
asset_uploaders[uploaded_by] +=1
251
259
created_at=asset.get('created_at')
252
260
message=f"An asset was uploaded by {uploaded_by} at {created_at}: {asset.get('url')}"
0 commit comments