
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
Install gitup-cli via NPM:
npm i -g gitup-cli
or if NPM requires root privileges:
sudo npm i -g gitup-cli
Once installed, this will expose the gitup shell command.
When using gitup for the first time, you will be required to login with an existing account or register a new one.
Note: be sure to replace any < ... > in the commands below with your desired/actual value.
gitup login <username>
This command will prompt you to register if the username entered does not exist. Registration will read your public key from ~/.ssh and generate a new user account.
gitup login <username>
If the username does exist, then gitup will proceed to authenticate the user.
gitup logout
gitup user
gitup new <repository-name>
This command, if authenticated, will generate a new repository located at gitup.io/<username>/<repository-name>, and will also generate necessary roles for you to access your new repo. Once generated, you can access your new remote repository via git@gitup.io:<username>/<repository-name>.git.
gitup commit <commit-message>
This command will automatically add all changes in the project, commit them, and push them to remote.
gitup add-user <repsitory-name> <username>
This command will create a new role for the specified user in the specified repository.
gitup remove-user <repository-name> <username>
This command will delete an existing user role for the specified repository. Use this command to revoke repository access for a specified user.
FAQs
lightweight, powerful repository hosting
We found that gitup-cli demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.