Using stock git porcelain and plumbing, how does one search all reachable commits for instances of possibly malicious additions to .GiT
, .gIt
, and so on?
For context, see
From the first link you've given (Git v2.2.1 Release Notes / Fixes since v2.2):
"git fsck" notices a tree object that records such a path that can be confused with ".git"
So, just update to the latest git, run git fsck
, and you are done.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With