Skip to content

Do not expose GitLab version on GitLab.com

We do run security fixes on GitLab.com before they get released.

Even if we keep them on dev the mirroring will make them available on .com if an attacker knows the SHA.

The problem is that we expose the SHA on the /help page and from the API.

My proposal here is to limit that detailed information only to an admin token on GitLab.com

We can easily implement this without breaking the compatibility for self-managed installation, later on we could think of an application setting to extend this also to customers.

/cc @gitlab-org/delivery

Edited by John Skarbek