RESEARCH OF METHODS AND TOOLS FOR IMPROVING GIT LFS PROTOCOL SECURITY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.1040

Keywords:

Git; Large File Storage; DevSecOps; data transfer vulnerabilities.

Abstract

In the current landscape of rapidly evolving DevOps and MLOps practices, the Git version control system has become the industry standard, capturing over 90% of the development market. The surge in machine learning adoption and the necessity of versioning large binary objects (ML models, datasets) have driven the widespread implementation of the Git Large File Storage (LFS) extension. However, the specific architecture of this protocol, based on separating metadata from file content, creates a new, critical attack surface that remains insufficiently explored within the context of Software Supply Chain Security. ​In light of these issues, the objective of this study is to perform a systemic analysis of architectural vulnerabilities in the Git LFS protocol and to develop a comprehensive set of practical recommendations for enhancing infrastructure security. To achieve this, threat modeling methods and experimental testing in a controlled environment were applied, specifically involving data migration between GitLab and GitHub. Additionally, the Batch API specification and hybrid authentication mechanisms were analyzed in detail. ​The study experimentally confirmed that using a hybrid transport model (SSH for Git, HTTPS for LFS) creates a "security context gap," complicating access validation. Based on the analysis, three groups of critical vulnerabilities were identified: confidentiality breaches due to insufficient object ownership verification, data integrity threats via file content substitution ("cache poisoning"), and availability risks due to quota exhaustion attacks (Quota-based DoS). Specifically, it was determined that the lack of hash verification on the cloud storage side allows for the injection of malicious code into ML models, bypassing standard security measures. ​Synthesizing the results, the paper systematizes attack vectors on LFS infrastructure and adapts international security practices mandated for LFS server protection. Key proposed measures include transitioning to a "Verify-before-Write" model, prohibiting the use of deploy keys for write operations, and implementing strict quota attribution to the current repository.

Downloads

Download data is not yet available.

References

Stack Overflow. (2025). 2025 Stack Overflow Developer Survey. Stack Overflow Insights. https://survey.stackoverflow.co/2025

Piergiorgio, L., Plate, H., Matias, M., & Barais, O. (2023). SoK: Taxonomy of attacks on open-source software supply chains. In 2023 IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP46215.2023.10179304

GitLab. (2024). 2024 Global DevSecOps Report: The state of AI in software development. https://about.gitlab.com/developer-survey/

Chen, Y., Wang, Q., Yang, Y., Chen, Y., Li, Y., & Ji, S. (2025). Unveiling security vulnerabilities in Git Large File Storage protocol. In 2025 IEEE Symposium on Security and Privacy (SP) (pp. 468–485). IEEE. https://doi.org/10.1109/sp61157.2025.00123

Blischak, J. D., Davenport, E. R., & Wilson, G. (2016). A quick introduction to version control with Git and GitHub. PLOS Computational Biology, 12(1), Article e1004668. https://doi.org/10.1371/journal.pcbi.1004668

Git. (n.d.). Git. https://git-scm.com/

Git Large File Storage. (n.d.). Git Large File Storage. https://git-lfs.com/

Schink, M., Wagner, A., Unterstein, F., & Heyszl, J. (2021). Security and trust in open source security tokens. IACR Transactions on Cryptographic Hardware and Embedded Systems, 176–201. https://doi.org/10.46586/tches.v2021.i3.176-201

Xiang, Z., Miller, D. J., & Kesidis, G. (2024). BadChain: Backdoor attacks in the supply chain of large language models. In 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) (pp. 1–18). IEEE.

Koohy, B., & Cito, J. (2023). Empirical analysis of security weaknesses in CI/CD pipelines. In 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR) (pp. 214–225). IEEE.

Downloads


Abstract views: 0

Published

2025-12-16

How to Cite

Havryliak, V. (2025). RESEARCH OF METHODS AND TOOLS FOR IMPROVING GIT LFS PROTOCOL SECURITY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 472–482. https://doi.org/10.28925/2663-4023.2025.31.1040