Skip to content

jef/gh-audit-org-keys

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

95 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

audit-org-keys Release Nightly Release

The point of this project is to help demonstrate that users of GitHub could potentially fall victim to getting their private SSH key cracked. This based on the size and complexity of the key the user generates.

Programs like ssh2john from John the Ripper can best demonstrate how fast an SSH private key can be solved from a not so complex algorithm with low key lengths (think RSA < 1024 bits).

Installation

go get -u github.com/jef/audit-org-keys

Also available under GitHub Releases as an executable.

Usage

It is required that you use a GitHub Personal Access Token (PAT). You can generate one here. The required scopes are ['read:org']. Set your PAT to environment variable GITHUB_TOKEN. If GITHUB_TOKEN isn't set, then you may not get the results you expect.

Usage of audit_org_keys:
  -o, --organization string   [required] GitHub organization provided to inspect
  -s, --show-users all        display users with filter (all, `with`, `without`, `multiple`)

Examples

  • audit-org-keys --organization="actions"
  • audit-org-keys --organization="actions" --show-users="all"

Releases

Tag Description
latest Built against tagged releases; stable
nightly Built against HEAD; generally considered stable, but could have problems

Acknowledgments