Member of the Security-Team. My user-sbassett board should be fairly up-to-date, though we also track some other work within Asana these days.
User Details
- User Since
- Sep 12 2018, 3:52 PM (378 w, 4 d)
- Roles
- Administrator
- Availability
- Available
- IRC Nick
- sbassett
- LDAP User
- SBassett
- MediaWiki User
- SBassett (WMF) [ Global Accounts ]
Fri, Dec 12
I've added @Blake to acl*security_sre.
Thu, Dec 11
Wed, Dec 10
Security Review Summary - T404738 - 2025-12-05
Last commit reviewed: 4a614aa4c0
Tue, Dec 9
Confirming @MLechvien-WMF has Phab 2fa enabled. @Kappakayala and @MLechvien-WMF - would you be able to provide a bit more detail about the need for this request? e.g. specific lines of work and Phabricator task examples that @MLechvien-WMF need access to? Thanks.
I've added you as a basic member to security@. Let us know if you need anything else.
Mon, Dec 8
Thu, Dec 4
Wed, Dec 3
Ping @EMill-WMF for awareness. This will likely be handled at our next clinic on 2025-12-08.
Tue, Dec 2
Currently stalled on efforts to better define and formalize Wikimedia's Phab access policies for volunteers and community members.
Mon, Dec 1
Ping @EMill-WMF for review.
Sun, Nov 30
Thu, Nov 27
Tue, Nov 25
Er, is there a specific change set or merge request that fixes the actual RCE? I didn't see an obvious one in gerrit or at github. https://gerrit.wikimedia.org/r/c/pywikibot/core/+/1210674 just updates the security policy.
Just scanning over https://gerrit.wikimedia.org/r/q/T401987, it looks like all of the backports have landed? And the hard deprecation is on master and in Wikimedia production, ready for 1.46 when it gets cut. So I think we can at least tentatively resolve this for now.
Mon, Nov 24
Playing around with this a bit locally, I think we either need to change the copy for the oathauth-delete-warning message or introduce a different code path/message. Because the code appears to be working properly in recognizing existing/remaining auth app keys. When I inspect $lastKey, $this->isPrivilegedUser() and even count( $remainingKeys ), all of those appear correct when I have 2+ auth app keys set for my account. But the only path the code can take in this case is rendering the oathauth-delete-warning message via: Html::element( 'p', [], $this->msg( 'oathauth-delete-warning' )->text() ) ); on line 641 of OATHManage.php.
Thu, Nov 20
Update
- The hard deprecation xslt patch is now merged on master, 1.46.0-wmf.3 (and deployed to Wikimedia production). There's also a currently-conflicted version of the patch up for review for REL1_45.
- The softer xslt deprecation patch is also now up for review for REL1_44 and REL1_43.
Wed, Nov 19
Hey @brennen - Any idea why I'd be getting errors about a non-existent path when trying to run some really basic CI? Sample job failure: https://gitlab.wikimedia.org/repos/projects/user-scripts-data-tooling/-/jobs/683407
# trying to install poetry via pip ... Installing collected packages: typing-extensions, pycparser, urllib3, sniffio, idna, h11, exceptiongroup, charset-normalizer, cffi, certifi, zipp, requests, msgpack, jeepney, httpcore, cryptography, backports.tarfile, anyio, zstandard, tomli, SecretStorage, rapidfuzz, pyproject-hooks, platformdirs, pbs-installer, packaging, jaraco.functools, jaraco.context, jaraco.classes, importlib-metadata, httpx, filelock, distlib, crashtest, cachecontrol, virtualenv, trove-classifiers, tomlkit, shellingham, requests-toolbelt, poetry-core, pkginfo, keyring, installer, findpython, fastjsonschema, dulwich, cleo, build, poetry ERROR: Could not install packages due to an EnvironmentError: [Errno 13] Permission denied: '/nonexistent' Check the permissions. Cleaning up project directory and file based variables 00:00 ERROR: Job failed: command terminated with exit code 1
Thanks and let me know if I should file a separate bug.
Tue, Nov 18
Per the 2025-11-18 meeting, next steps are:
- @ssingh and Traffic to clean up and optimize the most recent, existing vcl patch
- @ssingh to schedule deployment time for new config (likely within about 2 weeks)
- @ssingh and Product Safety and Integrity to alert relevant WMF / Community folks (specifically test engineers)
- Product Safety and Integrity to evaluate relevant CSP log data and determine if a rollback is necessary (this should only be the case if there are extreme disruptions on testwiki or report-only logspam)
Mon, Nov 17
Nov 13 2025
This functionality is likely only necessary under the single recovery code model which, as has been noted, is not the current configuration within Wikimedia production and likely never will be again.
Nov 12 2025
Just noting again that deploy_security.py isn't really officially sanctioned or maintained by anyone on the Security-Team or Product Safety and Integrity.
Nov 10 2025
Verified that @Peter has Phab 2fa enabled.
Nov 7 2025
Nov 6 2025
Nov 5 2025
Hey @brennen - Thanks! Looks like we're all good here.
Thanks, @jsn.sherman. Is there a more specific deployment date for this code? Not that this review would necessarily block such a milestone.