Settings

Theme

GitHub is investigating unauthorized access to their internal repositories

twitter.com

360 points by splenditer 7 hours ago · 123 comments

Reader

foota 2 hours ago

Sure, I'm frustrated by the github outages too, but hacking into github to fix their code seems like a bit of an overreaction.

Xunjin 3 hours ago

GitHub: " Our current assessment is that the activity involved exfiltration of GitHub-internal repositories only. The attacker’s current claims of ~3,800 repositories are directionally consistent with our investigation so far."

Oof

https://xcancel.com/github/status/2056949169701720157

  • nomilk an hour ago

    Pre-AI, having access to code (e.g. if it leaked or even just open source) could allow hackers to more easily discover exploits. I wonder if that threat is now much more severe in the age of AI. Thankfully GitHub have probably themselves run their code through many AI security tools so any vulnerabilities would have already been found and patched. Hopefully.

  • EDM115 32 minutes ago

    directionally, how bad is this ?

tiffanyh 5 hours ago

Is Twitter/X the right channel to announce a security event like this?

I ask because I don’t see anything posted on their official blog or status page.

https://github.blog/

https://www.githubstatus.com/

  • lynndotpy 3 hours ago

    It's certainly not the right platform. It'd be one thing if they had any official communication on the matter anywhere else. Maybe they're ashamed and are trying to limit the visibility while only technically issuing an announcement.

    They announced this exclusively on X.com, which ranks barely above Pinterest in terms of usage. That's below Reddit, Snapchat, WeChat, and Instagram, and requires a user account to view profiles and posts. And that's ignoring all the reasons X is a divisive platform with an extreme political bent.

    GitHub chose not to announce this on any other social media either (BlueSky, Facebook, TikTok, YouTube, LinkedIn, or Mastodon, as of this posting, and with no emails sent on the matter.)

    • sph an hour ago

      Who the heck follows Github on Snapchat, TikTok, YouTube, Pinterest, Instagram, Reddit, Facebook, WeChat?

      Wherever they posted, there’s at this time two articles on the Hacker News front page. Sounds like they have reached their audience.

    • bulbar 2 hours ago

      > Maybe they're ashamed and are trying to limit the visibility while only technically issuing an announcement.

      I think that's panic mode from some decision maker (i.e. head of marketing or head of security).

      • jurgenburgen an hour ago

        It’s not like they have a choice as a public company. I wonder if this low visibility post meets SEC requirements though.

  • apublicfrog an hour ago

    It's been pretty common in the past for tech companies to announce outages and quick updates about them on twitter for decades. I'm sure their status page etc will be updated soon, but it's historically been the fastest way to get things out to the wider audience whilst bypassing the "official mail out" review by marketing etc.

    • mcintyre1994 an hour ago

      I think that was a lot more justifiable when Twitter reliably let logged out users read tweets. X seem to tweak it all the time, or maybe it’s just broken a lot, but sometimes I can’t even load a tweet in a browser that isn’t logged in.

    • numpad0 33 minutes ago

      It doesn't show live profile pages to logged out users since a while ago. You get cached summary pages, an age gate error, or sometimes a straight up 404.

      Most individual permalinks (.com/username/1234...) don't work without logging in, either, and the official client now uses `/i/` in place of usernames for permalinks(bogus usernames always worked; pkey was the timestamp).

      This means an organizationally shared Twitter account for announcements is not a viable concept, at least until Twitter is to be transferred again to whoever would be a better keeper of it.

  • fulafel an hour ago

    Even if it's a wingnut dense place, there's good arguments for using a channel independent of your infra in a case like this. You (or Github themselves) don't know if their status page is pwned.

  • jandrewrogers 2 hours ago

    They should send messages directly to their customers as a first step in addition to posting an official article on their site. That’s the minimum. If they haven’t done that then it is hard to defend.

    Beyond that, Twitter is the de facto default dissemination vehicle, due to its reach. Even if people are not on Twitter, they are likely to see things from people that are on Twitter.

  • hansmayer 30 minutes ago

    I mean if you are going to use AI which was trained on code of statistically mediocre average at the best, have outages and major incidents every few days, why not go wild and start publishing incidents to twitter too? It checks out with the rest of the stuff.

  • cebert 5 hours ago

    It’s a very popular messaging platform for tech enthusiasts.

    • ignu 3 hours ago

      also a very popular messaging platform for [redacted] enthusiasts

    • yallpendantools 5 hours ago

      So? Is this where your corporate paying clients should find out about an issue of this severity?

      Not to mention Twitter is not an open platform anymore! (A) I'm an employee in an organization paying for Github. (B) I don't have a Twitter account. I already have a Github account because of (A). Why should (B) stop/delay me from getting official comms about this?

      • zdragnar 3 hours ago

        I can't imagine they'd spam every account with an email address, though an email to organization owners would make more sense.

        • yallpendantools 3 hours ago

          > I can't imagine they'd spam every account with an email address

          It's not "spam" if it is relevant to me, such as security incident disclosures.

          Also, as tiffanyh pointed out, what's wrong with Github blog or is that exclusively for marketing fluff now? That would've been appropriate enough, without having to spend Sendgrid credits.

        • bulbar 2 hours ago

          Mailing every (potentially) affected entity is common and good practice for major incidents.

      • insanitybit 4 hours ago

        Isn't it the first stop for the USG at this point? I mean, I wish the world were a different place but here we are.

  • niyikiza 3 hours ago

    Probably the best option after sending a mass email when customers need to take action. The status page is for reliability issues impacting end users & the blog is for in-depth analysis.

  • wutwutwat an hour ago

    watch it turn out to be that their twitter account is what was hacked, and github.com is actually fine

    • smsm42 40 minutes ago

      Yes, and github having zero-nines reliability record is because of a hacked twitter account too! (sigh...)

uzyn 6 hours ago

The security issue aside, seeing more companies push announcements like these on X as the only official source is a trend I'm not sure I like.

I can understand the rationale, this feels lighter and not something that belongs on status.github.com or the blog. Maybe what's actually missing is an official channel for ephemeral stuff on a domain they own, somewhere between a status page and a tweet? Just sharing an observation.

  • sph an hour ago

    Are you from 2015? Companies have been announcing stuff on Twitter for a decade, and the rest of social media has been regurgitating Twitter posts for almost as long. Newspapers routinely quote Twitter. All that happened before they even renamed it to X.

    I’m not saying it’s a good idea. I am saying it somehow became the single source of truth for the Internet with all that entails.

    • avaer 34 minutes ago

      You are kind of saying it's a good idea or at least a totally acceptable one.

      You're saying Twitter is famous for being famous, and looking down at someone who expresses dismay at this for being behind the times.

      • sph 31 minutes ago

        I do not have a Twitter account. You do. It is the cesspool of humanity and one of the reason the Internet has become so shit.

        Please try not to contradict my very words to make a point. That’s very Twitter-like of you.

        • avaer 26 minutes ago

          Fair enough! Not a fan of Twitter either.

          Which is why I wouldn't want to normalize it being the kind of place where company announcements are made. IMO anyone who sees it as worrying is right, and I'm glad they're not desensitized.

          Just because it's been going on for a decade doesn't make it any less crazy that Twitter has become a primary source of news.

  • riffraff 2 hours ago

    I don't see why this wouldn't fit on status.github.com.

    Social media posts were literally called "status updates" at some point.

  • seb1204 an hour ago

    As a stock listed company is GitHub or Microsoft not required to disclose such security breaches to their shareholders? As in a stock market communication?

  • niyikiza 3 hours ago

    My understanding is that when it's something that requires user action they'd directly send comms to customers.

vldszn 6 hours ago

GitHub: "We are investigating unauthorized access to GitHub’s internal repositories. While we currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises, organizations, and repositories), we are closely monitoring our infrastructure for follow-on activity."

  • TZubiri 5 hours ago

    It reminds me of the famous "mistakes were made" Nixon quote.

    "We are investigating unauthorized access" sounds much better than "we've been hacked"

    • tomkarho 3 hours ago

      This reminds me of George Carlin standup routine about PTSD. If you want to make any bad news sound less bad, just wrap the concept around complicated jargon to sterilize it.

      • SoftTalker 2 hours ago

        Carlin would have loved watching the big tech companies fall victim to the very LLMs they created.

    • vldszn 5 hours ago

      Exactly =)

keyle 5 hours ago

This is bad. If they came out announcing this, without a long winded explanation and further details, it's because they're staring at a bottomless pit and they haven't put the lid on it yet.

For a Fortune 100, to go out of your way to spook investors is the least desirable approach.

  • CGamesPlay 2 hours ago

    > For a Fortune 100, to go out of your way to spook investors is the least desirable approach.

    The company that had 40 million Azure servers compromised? This is a drop in the bucket, the investors clearly do not care about this.

    https://www.microsoft.com/en-us/security/blog/2026/05/18/sto...

  • eli 5 hours ago

    Letting people know promptly is also the right thing to do and probably mandated by (at least some) customer contracts. You can't tell just some people; it would leak anyway.

  • bostik an hour ago

    Part of this is likely driven by regulations. Github has plenty of clients that fall under DORA, NIS2 or both.

    I don't remember the exact wording about what qualifies as "incident" or "major incident" but the TL;DR is that the regulated entities are required to notify their regulators of impactful supplier incidents within 24h with initial information and within 72h with more complete details.

    Which in turn means that Github will have signed contracts that bind them to accommodating timelines.

vldszn 6 hours ago

- Use Static analysis for GHA to catch security issues: https://github.com/zizmorcore/zizmor

- set locally: pnpm config set minimum-release-age 4320 # 3 days in minutes https://pnpm.io/supply-chain-security for other package managers check: https://gist.github.com/mcollina/b294a6c39ee700d24073c0e5a4e...

- add Socket Free Firewall when installing npm packages on CI https://docs.socket.dev/docs/socket-firewall-free#github-act...

bananamogul 3 hours ago

I have a hard time believing this because there was never enough GitHub uptime to carry out the attack.

ande-mnoc 2 hours ago

Will they revisit the decision to not add a permission model to VSCode extensions?

https://news.ycombinator.com/item?id=43181789

dijksterhuis 6 hours ago

non-twitter link: https://xcancel.com/github/status/2056884788179726685#m

  • Cider9986 3 hours ago

    This should be the defacto for all X links. For users who aren't signed in, X is such a hostile website you can't see anything.

    I guess it's hostile to signed in users in a different way.

Ozzie_osman 2 hours ago

Grafana had a very similar incident: https://grafana.com/blog/grafana-labs-security-update-latest...

Shank an hour ago

I would say, first and foremost, the era where a developer machine with source code access also has access to meaningful security systems should be over. Internal repository access should mean nothing. It's just text files. It does look like this is the case here, where there aren't actually meaningful outcomes from this, but this should be the case everywhere. Isolate these systems from each other. GitHub compromise could happen at any time, even from GitHub themselves.

mort96 2 hours ago

Do they publish these things on a platform other than Twitter too? Or is their policy that you ought to need a Twitter account to follow their security statements?

buryat 4 hours ago

Sympathy to engineers and everyone at github, it's good that they're being open even if findings are limited. I'm sure they will figure out the root cause and will publish results to be a learning experience for everyone else

lugu an hour ago

I will go ahead and delete my private repos on GitHub. Not sure I can trust this platform with their code source exposed. Nice wake-up call.

gyoridavid 22 minutes ago

maybe they just wanted to fix a few outstanding bugs..

tariky 2 hours ago

Time to move all my code from github. I was hoping they it will get better but it looks like it is getting much worst. Good bye github.

  • toastal 2 hours ago

    Join the club! I did as soon as the Microsoft acquisition realizing this would be only a matter of time… with more projects (finally) leaving that ecosystem, I might finally be able to delete my last account with Microsoft.

  • baq 2 hours ago

    GitHub is like democracy - the least worst forge

killingtime74 5 hours ago

Time to switch to Gitlab, Bitbucket or self-hosted

MallocVoidstar 5 hours ago

https://pbs.twimg.com/media/HItbXhvW4AAMD8W?format=jpg&name=...

All of their repos have been copied and are up for sale. Attackers are TeamPCP, the creators of the Shai-Hulud malware.

  • mpetrovich 5 hours ago

    If that’s true and they do intend on shredding their copy on sale, what stops GitHub from buying it back themselves? (through a proxy, obv)

    • neom 3 hours ago

      Nothing, this is one of the most common types of ransomware going on right now, exfiltration only extortion.

    • ferguess_k 4 hours ago

      I probably wouldn't believe that "shredding". Also there will be legal consequences I think?

shevy-java 3 hours ago

As some of us stated in the last weeks: Microsoft is working hard to get people to reconsider GitHub. All those small issues keep on adding up. Something is seriously flawed at Microsoft here - those problems did not exist in that way 2 or 3 years ago. It coincides with the rise of AI.

e-dant 3 hours ago

Is gitea any good?

  • FrostKiwi 2 hours ago

    Self hosted gitea for many years with ~25 devs. Yes, it's essentially a FOSS carbon copy of GitHub. CI/CD is also intercompatible, uses the same syntax and pulls the original GitHub Actions packages. Now with the Forgejo split, I would prefer Forgejo, as it has way more steam behind it with Codeberg and Blender as the big use-cases.

  • JCTheDenthog 2 hours ago

    I prefer Forgejo, which is a Gitea fork. Forgejo is what runs Codeberg if I understand correctly.

mstank 7 hours ago

Is it just me or is this happening way more frequently in the last 4 or 5 months? Coincidently around the same time the models got a lot more capable?

  • insanitybit 4 hours ago

    I think AI has helped to a degree. I think a lot of people have known about massive gaps in security, but it's been a sort of "why would I?" and a gap that didn't feel worth hopping for attackers.

    The gap is smaller now.

    I've been talking about package worms for... fuck, a decade. Insane. I've even thought about publishing one to prove a point but, well, it's illegal obviously. And ethically questionable.

    Someone just vibecoded up what we've all known was possible for a long, long time. Just like a lot of other vibe coded projects.

    I remember talking to a malware author a long time ago and I think this would have been exactly what he would have loved. He liked building custom C2 protocols, tiny malware, etc, but when we discussed a particular idea for owning massive amounts of infrastructure his response was basically "that's a lot of effort to get a krebs article and FBI attention". Now it's not so much effort!

  • edelbitter an hour ago

    Also coincides with the time I started seeing Juniors installing "recommended extensions" into GitHub-hosted Visual Studio environments.. because there was a popup that helpfully suggested doing so, based on the programming languages used in the checked out repository.

  • daemin 2 hours ago

    Do you mean because more people are vibe coding, trusting the models' output, and putting code directly into production, so there are more security vulnerabilities created?

    Or because there are more source code scanners which end up finding more vulnerabilities?

  • tom_ 6 hours ago

    It's more likely that it isn't coincidental at all: software development-oriented LLMs became a lot better towards the end of 2025, and so there's a non-zero chance that people are using them to find new security exploits.

    (People are not sleeping on this and it is not something people have failed to notice. I don't use LLMs at all and even I have noticed it - largely because there is approximately nobody that isn't talking about it.)

    • OptionOfT 5 hours ago

      I think the other side is much more important. With company mandates to use AI as much as possible, there has been a deluge of low-quality PRs. Everybody is feeling tired from reviewing those, and quite possibly numerous security issues have been introduced since.

      • tom_ 4 hours ago

        Ahh, that's a good point, and I actually hadn't thought of that angle! I was thinking of it purely from the point of view of the attackers using LLMs to generate interesting new exploits, with a side helping of letting myself get mildly annoyed, possibly incorrectly, by the writing style.

        But yes, it's also possible the defenders have been kind of forced into having the slop machine shit out a huge pile of shit-ass changes, one way or another, that end up making the attackers' job even easier. (Even assuming no mechanisation at their end! Which is of course in nearly-June of 2026, probably unrealistic. And LLMs do appear to be really quite good at that side of the equation...)

      • skydhash 4 hours ago

        The most dangerous is where the new feature works well and is using safe APIs, but integration is quietly broken somewhere. The risk of incoherent state is way higher because you no longer have a small set of people that knows the complete theory of the software and can find discrepancies.

    • tptacek 5 hours ago

      There is a 100% chance that people are using LLMs to find vulnerabilities and build exploits. If it was possible for something to be a 101% chance, that's what it would be.

      • tom_ 4 hours ago

        Apologies to all - I am British. The phrase "non-zero" does cover every case other than zero, but the intent is that it covers some cases more than others. What I'm trying to say is: yes. My intent was just to push back on this specific (and slightly bizarre to me) instance of kind-of-vagueposting, to my eyes written to imply that it might be some sort of unnoticed conspiracy, detectable only by the most enlightened of observers, attuned to the subtle signals that most people miss: that people are using LLMs to find security exploits.

        • tptacek 4 hours ago

          Right, no, what I'm snarkily saying is that basically everybody who has ever looked for a vulnerability before is now using LLMs to do it. It's a huge thing in exploit development right now.

  • guluarte 5 hours ago

    I heard an engineer at Anthropic was submitting 150 PRs per day. That's one PR every 5 to 10 minutes, so you can guess the level of review and quality control involved.

    • tomrod 4 hours ago

      I have days with those kinds of PRs. Usually because I'm too lazy to check color compatibility outside the browser.

  • ares623 3 hours ago

    You know how Windows used to get a majority of the malware due to market share?

    Now the market share is all the AI agent users.

  • bob1029 6 hours ago

    I think it's more about the popularity than the capability. The chances you might accidentally put a Github access token into an undesired security context goes up dramatically when you actually create and use one on a regular basis. The developers at GH are certainly using these tools just like the rest of us.

surrTurr 5 hours ago

"Someone broke into our house and we have no clue if they're still hiding under the bed or in the drawer. TV is gone."

waynesonfire 6 hours ago

Are they required to announce that they're being hacked in real time?

starkeeper 3 hours ago

this is so amazing and brilliant display of the enshitification wow they won't fire the right people gauranteed maybe a slightly smaller ``bonus``

senectus1 2 hours ago

its infuriating that they still haven't listed the poisoned extension..

syngrog66 6 hours ago

between all the Linux LPEs and Claude's known security flaws, alone, I'd be shocked if Github and Microsoft hadnt gotten hacked by now. reasonable bet we mainly hear it when big shops get bit

  • TZubiri 5 hours ago

    Before 2026 I hosted client code on GitHub, now it feels suboptimal, code is both an intellectual property asset and security risk. Especially if the company is software based, self-hosting your code just has a much better risk profile for almost no cost.

    It's also one of those things that warms your team up and gets them ready for actual work, a team that has to self host their git and other infra, like self-hosting DNS servers with bind, will have a much better work ethic than engineers who click buttons on a SaaS and conflate their role as users of a system instead of admins of one.

    Additionally, using github actions, and relying on Pull Requests (Tm) (R) (C) has always been (useful) vendor lock in (and a security risk in case of GH Actions). It wasn't enough to lock down a choice, but it tilts the balance in favour of less dependencies, which with the increase of CVEs and supply chain vulns, seems to be the name of the game for this new era. Build it in house, ignore the dogma.

kiernanmcgowan 6 hours ago

Mythos has broken containment

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection