01 What Can You Trust? Tap or hover to inspect
This imposter commit impersonates Guillermo Rauch (CEO of Vercel). It appears in actions/checkout via cross-fork object sharing, but was never merged—the attacker spoofed his identity. Check any commit →
User-Controlled
The message is whatever the committer writes. This one mimics a legitimate bug fix with a fake PR reference.
From 70379aad1a8b40919ce8b382d3cd7d0315cde1d0 Mon Sep 17 00:00:00 2001
Commit SHA
The SHA-1 hash uniquely identifies this commit and can't be forged. The timestamp here ("Mon Sep 17 00:00:00 2001") is a fixed placeholder git uses in patch format—ignore it. The real date is in the
Date: line below.From: <rauchg@gmail.com>
Spoofable Identity
The From field comes from
git config user.name and user.email. Anyone can set these to any value—no verification required.Date: Fri, 9 Jan 2026 07:42:00 +0000
Spoofable Timestamp
The commit date is set by the committer's local machine. It can be set to any time using
GIT_COMMITTER_DATE or --date.Subject: [PATCH] Fix tag handling: preserve annotations and explicit fetch-tags (#2356)
---
action.yml | 19 ++++++++++++++++---
1 file changed, 16 insertions(+), 3 deletions(-)Spoofable Message
The commit message is free text. Attackers craft messages that look legitimate to blend into the codebase history.
{
"sha": "70379aad1a8b40919ce8b382d3cd7d0315cde1d0",
"commit": {
"author"Spoofable IdentityFrom git config user.name and user.email. Anyone can set these to any value—no verification required.: {
"name": "Guillermo Rauch",
"email": "rauchg@gmail.com",
"date": "2026-01-09T07:42:00Z"
},
"committer"Also SpoofableSame as author—set via git config. Often identical to author, but can differ (e.g., when someone applies a patch).: {
"name": "Guillermo Rauch",
"email": "rauchg@gmail.com",
"date": "2026-01-09T07:42:00Z"
},
"message": "Fix tag handling: preserve annotations...",
"verification"Signature CheckGitHub checks for GPG/SSH signatures. verified: false means no valid signature was found—anyone could have made this commit.: {
"verified": false,
"reason": "unsigned",
"signature": null
}
},
"author"Misleading LookupGitHub matches the commit email to a registered account. This shows the linked account, not who actually made the commit. Attackers use victim emails to trigger this link.: {
"login": "rauchg",
"id": 13041,
"type": "User"
},
"committer"Same LookupSame email-to-account matching. The avatar and profile link you see on GitHub come from this lookup—not from the commit itself.: {
"login": "rauchg",
"id": 13041,
"type": "User"
},
"stats": { "additions": 16, "deletions": 3 },
"files": [{ "filename": "action.yml", "status": "modified" }]
}02 Vigilant Mode
Most commits are unsigned. Without vigilant mode, you don't see this—absence of a badge feels like implicit trust.
abc123f
Fix parser bug
?
Unverified
This commit is unsigned—no cryptographic proof of who made it. With vigilant mode enabled, unsigned commits are explicitly flagged.
def456a
Co-authored commit
?
Partially Verified
The commit is signed and verified, but has a co-author who enabled vigilant mode. The signature only covers the committer—not all contributors.
ghi789b
Add feature
Verified
Verified
The commit is signed, the signature was successfully verified, and the committer is the only author who has enabled vigilant mode.
Enable vigilant mode: Settings → SSH and GPG keys → Flag unsigned commits as unverified. GitHub Docs ↗
03 GitHub vs. Local Verification
- ✓ Signature exists
- ✓ Key in GitHub's registry
- ? Key still valid?
- ? Key compromised?
- ? Right person's key?
Trusts GitHub's key management
- ✓ Signature exists
- ✓ Key in YOUR keyring
- ✓ You checked revocation
- ✓ You trust this key
$ git verify-commit abc123fgpg: Good signature from "Name <email>"
When does this matter? High-security environments, compliance requirements, or when you can't fully trust GitHub as an intermediary.
04 In The Wild
Timezone Manipulation
2024
xz-utils Backdoor
"Jia Tan" manually manipulated git timezone metadata to create a false geographic identity. Analysis revealed physically impossible timezone jumps—UTC+03:00 to UTC+08:00 in 71 minutes—exposing the deception.
Sherman & Bibaud @ Margin Research ↗
Forged Commit Identity
2026
TeamPCP Supply Chain Campaign
Attackers spoofed legitimate maintainer identities via
Full incident timeline ↗
git config, then pushed malicious fork commits that appeared authored by trusted developers. GitHub displayed the victim's avatar and profile.