Using stock git porcelain and plumbing, how does one search all reachable commits for instances of possibly malicious additions to .GiT, .gIt, and so on?
For context, see
From the first link you've given (Git v2.2.1 Release Notes / Fixes since v2.2):
"git fsck" notices a tree object that records such a path that can be confused with ".git"
So, just update to the latest git, run git fsck, and you are done.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With