CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

Protect Your Repos: Block .git and .svn Access with SafeLine

Sensitive version control and config files like .git, .svn, .htaccess, and shell history files should never be exposed over the web. If left unprotected, they can leak credentials, internal repo details, or other private data.

SafeLine WAF provides a simple but effective ruleset to block any direct HTTP access to these files, making it a must-have for homelab users and self-hosted environments.


Why Is This Important?

  • Source code exposure: Attackers can download your entire repo if .git is accessible.
  • Server configuration leaks: Files like .htaccess or .bash_history can reveal system settings or secrets.
  • Reconnaissance protection: Stops bots and scanners from mapping your internal structure.

The Rule in SafeLine

This SafeLine ruleset (available for v7.3.0 and above) uses a simple regex to deny access to sensitive file patterns:

Blacklist:

  • Name: Block .git/.svn access
  • Match: URL Regex
  • Pattern:
.(svn|htaccess|bash\_history|bash\_profile|git)
Enter fullscreen mode Exit fullscreen mode
  • Action: Deny

No whitelists are defined by default (you can add exceptions if needed).


How to Apply It

  1. Go to your SafeLine WAF management console.
  2. Create a new URL Regex Rule under your desired policy group.
  3. Paste the regex:
.(svn|htaccess|bash\_history|bash\_profile|git)
Enter fullscreen mode Exit fullscreen mode
  1. Set action to Block/Deny.
  2. Deploy and test on a staging environment before production.

Best Practices

  • Combine with other SafeLine rules: Pair this with User-Agent filtering and bot-blocking for full coverage.
  • Keep sensitive files out of webroot: Blocking is good, but proper file placement is better.
  • Regularly audit access logs: Ensure no unauthorized attempts are slipping through.

Join the SafeLine Community

If you continue to experience issues, feel free to contact SafeLine support for further assistance.

Top comments (0)