Our Local Gitlab Server Has Been Under Attack by Anthropic Google Ovh and More
Postedabout 2 months agoActiveabout 2 months ago
twitter.comTechstory
calmpositive
Debate
20/100
GitlabSecurityNftables
Key topics
Gitlab
Security
Nftables
The author shares their experience of their local GitLab server being under attack, but successfully blocked by nftables and nginx, sparking a discussion on security measures.
Snapshot generated from the HN discussion
Discussion Activity
Light discussionFirst comment
4m
Peak period
3
0-1h
Avg / period
3
Key moments
- 01Story posted
Nov 14, 2025 at 10:50 AM EST
about 2 months ago
Step 01 - 02First comment
Nov 14, 2025 at 10:54 AM EST
4m after posting
Step 02 - 03Peak activity
3 comments in 0-1h
Hottest window of the conversation
Step 03 - 04Latest activity
Nov 14, 2025 at 11:18 AM EST
about 2 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45927995Type: storyLast synced: 11/17/2025, 6:04:56 AM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
Does Gitlab front-end with Nginx or Haproxy?
If there are archived access logs that would be a good place to try to figure this out.
In NGinx the block looks like this [1] or change it to a redirect to a static landing page.
If this is not an option then restrict repo access to approved SSH clients.
If this is not an option then put authentication on the repos hit hardest and a page that explains what the user/password is along with an acceptable use policy for using the authentication. If AI are trained to learn the authentication they will be violating the AUP written by your lawyers. Make the AI vendors give you enough money to upgrade your infrastructure to handle their load.
TL;DR find the differences between bot behavior and real people then make rules that will break the bots. There's always a difference. When all else fails block the CIDR blocks of all the known AI networks and play whack-a-mole for anything outside of their networks. Not perfect, nothing is but it will lower the load.
If going the blocking route, add all their CIDR blocks and IP's into a text file that gets read by a startup script to
That will prevent HAproxy from being able to complete the handshake and is a much lower CPU and memory load on the server than using firewall rules.[1] - https://mirror.newsdump.org/nginx/inc.d/40_https2_stuff.conf...