You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
Next: Root
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
The Atlassian Community can help you and your team get more value out of Atlassian products and practices.
On April 15th, Codecov disclosed that “someone had gained unauthorized access to their Bash Uploader script and modified without their permission”.
Atlassian immediately began investigating the incident. Though Atlassian uses Codecov tools within our environment for a small number of internal projects, our own investigation has concluded that our network and cloud products are not affected.
Upon deeper investigations, we identified a small number of variables that may have been exposed to the bad actor and did not find any malicious use of these credentials. We then rotated all potentially exposed secrets or credentials, preventing any future misuse of them.
We did identify a number of Bitbucket customers using Codecov within their pipelines and have notified them directly of any impacts to their account and shared recommended steps for remediation.
We will continue to monitor the situation as it evolves and provide updates as necessary.
Jodie Vlassis
Senior Trust & Security SME
Atlassian
Sydney, Australia
9 accepted answers
1 comment