{{#include ../../../banners/hacktricks-training.md}}
For more information about Source Repositories check:
{{#ref}} ../gcp-services/gcp-source-repositories-enum.md {{#endref}}
If an external repository is being used via Source Repositories an attacker could add his malicious code to the repository and:
- If someone uses Cloud Shell to develop the repository it could be compromised
- if this source repository is used by other GCP services, they could get compromised
{{#include ../../../banners/hacktricks-training.md}}