You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
Our client received an email today from a security company stating that we have a serious security issue. As proof that the vulnerability is valid they included a valid tree and parent ID / commit ID as well as the author name and email from our private Bitbucket repository.
I double checked that our repository is indeed set to private. I spoke with the hosting company to confirm they do not see anything malicious on their end. If I try to view the /.git folder by directly typing it in the url I receive a 404 error.
My question is, how were they able to obtain those details from our private Bitbucket repository and what should I do to ensure our repository and website are secure?
Hi, @willking101, thank you for reaching out to Atlassian Community.
As we’ll need to know the workspace ID and repository name to further investigate this case, I have created an internal ticket for you using the email of your community account, so you don't have to share this information here.
You should have received an email with a link to the support ticket. Just in case you haven't received it, please feel free to let me know and I can post the ticket URL here. The ticket will be visible only to you and Atlassian staff, no one else can view its contents even if they have the URL.
Please feel free to let me know if you have any questions.