Using stock git porcelain and plumbing, how does one search all reachable commits for instances of possibly malicious additions to .GiT
, .gIt
, and so on?
For context, see
Using stock git porcelain and plumbing, how does one search all reachable commits for instances of possibly malicious additions to .GiT
, .gIt
, and so on?
For context, see
From the first link you've given (Git v2.2.1 Release Notes / Fixes since v2.2):
"git fsck" notices a tree object that records such a path that can be confused with ".git"
So, just update to the latest git, run git fsck
, and you are done.