Boost logo

Boost :

From: Andrey Semashev (andrey.semashev_at_[hidden])
Date: 2021-04-27 08:39:29


Hi,

I found this in my news feed today:

The codecov-bash script that is used to upload codecov reports from CI
to codecov.io was maliciously modified to collect sensitive information
and send to a third party server. Things like private keys, credentials,
auth tokens used in the CI might be compromised.

https://discuss.hashicorp.com/t/hcsec-2021-12-codecov-security-event-and-hashicorp-gpg-key-exposure/23512
https://about.codecov.io/security-update/

I'm not using codecov, and I have vague understanding how it works, but
I've seen it used in Boost libraries' CI. I don't know if they are
affected, this is an FYI to the maintainers.


Boost list run by bdawes at acm.org, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk