<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="/feeds.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>Notes sur GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog</title>

    <link href="https://app.flus.fr/links/1863791377503983343" rel="alternate" type="text/html" />
    <link href="https://app.flus.fr/links/1863791377503983343/feed.atom.xml" rel="self" type="application/atom+xml" />
    <link href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854" rel="via" type="text/html" />

    <id>tag:app.flus.fr,2026-04-29:links/1863791377503983343</id>
    <author>
        <name>Marien</name>
    </author>
    <generator>flus/2.4.0 (https://app.flus.fr/about)</generator>

            <updated>2026-04-29T10:06:33+02:00</updated>
    
                    <entry>
            <title>Notes par Marien</title>
            <id>tag:app.flus.fr,2026-04-29:notes/991f8e74151959d977afd9be6eb6a1e9</id>

            <link href="https://app.flus.fr/links/1863791377503983343#note-991f8e74151959d977afd9be6eb6a1e9" rel="alternate" type="text/html" />

            <author>
                <name>Marien</name>
            </author>

            <published>2026-04-29T10:06:33+02:00</published>
            <updated>2026-04-29T10:06:33+02:00</updated>

            <content type="html"><![CDATA[<blockquote>
<p>By exploiting an injection flaw in GitHub's internal protocol, any authenticated user could execute arbitrary commands on GitHub's backend servers with a single <code>git push</code> command - using nothing but a standard git client.</p>
</blockquote>]]></content>
        </entry>
                    <entry>
            <title>Notes par Marien</title>
            <id>tag:app.flus.fr,2026-04-29:notes/eaf30c94d4eb3422ae8672a9a039fae0</id>

            <link href="https://app.flus.fr/links/1863791377503983343#note-eaf30c94d4eb3422ae8672a9a039fae0" rel="alternate" type="text/html" />

            <author>
                <name>Marien</name>
            </author>

            <published>2026-04-29T10:07:39+02:00</published>
            <updated>2026-04-29T10:07:39+02:00</updated>

            <content type="html"><![CDATA[<blockquote>
<p>This research was made possible by AI-augmented reverse engineering tooling, particularly IDA MCP, which allowed us to rapidly analyze compiled binaries and reconstruct internal protocols at a speed that would not have been feasible manually. As these tools continue to mature, we expect them to play an increasingly important role in uncovering vulnerability classes that require deep cross-component analysis.</p>
</blockquote>]]></content>
        </entry>
                    <entry>
            <title>Notes par Marien</title>
            <id>tag:app.flus.fr,2026-04-29:notes/0ab6f66f33c0c6ed0e113e8ca8be0524</id>

            <link href="https://app.flus.fr/links/1863791377503983343#note-0ab6f66f33c0c6ed0e113e8ca8be0524" rel="alternate" type="text/html" />

            <author>
                <name>Marien</name>
            </author>

            <published>2026-04-29T10:07:59+02:00</published>
            <updated>2026-04-29T10:07:59+02:00</updated>

            <content type="html"><![CDATA[<p><a href="https://app.flus.fr/p/1670839367044869607/links?tag=GitHub" class="badge badge--tag">#GitHub</a> <a href="https://app.flus.fr/p/1670839367044869607/links?tag=s%C3%A9curit%C3%A9" class="badge badge--tag">#sécurité</a></p>]]></content>
        </entry>
    </feed>
