So what classes of attack exist here?

Social/trojan:
They might get the user to run code they shouldn't, which then sets up
an SSH/CoC/GPG/changes their email [but we already have a handshake on
email changes], and then with the access the SSH/GPG/PPA gives them do
something bad (like push garbage into a branch).

Mail multiplication? I don't think so, the only person able to trigger
a 'new ssh' email is the user themselves, unless their credentials
have been leaked already.

Mail to other people? Not through this API - the 'setup a new email
address' API would definitely permit that - but not permit controlling
the content in the mail (I hope ? !)

-Rob

_______________________________________________
Mailing list: https://launchpad.net/~launchpad-dev
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~launchpad-dev
More help   : https://help.launchpad.net/ListHelp

Reply via email to