this post was submitted on 19 May 2026
480 points (99.6% liked)

Technology

84769 readers
3771 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] mlg@lemmy.world 22 points 2 hours ago* (last edited 2 hours ago) (1 children)

GitHub gets autoscanned by thousands of malicious actors for keys and credentials on every commit, including the comments lol.

The fact that CISA themselves never saw an automated breach attempt only minutes after pushing to github is the more interesting story here.

Either the contractor is so incompetent that they didn't have any logging set up and the breach went completely unnoticed for 6 months.

Or this really is some fat honeypot that they won't admit is a honeypot because they've been using it to watch or bait APTs.

Currently, there is no indication that any sensitive data was compromised as a result of this incident

This is literally impossible unless it really was a honeypot. You can demo this yourself in real time. Make a throwaway cloud account on your favorite provider, commit the cloud auth token into a repo, and you will see an automated bot login within minutes.

Commiting any secrets to a public repo should just be considered auto compromised because of how potent it is.

That stuff ususlly gets exposed via poor CI/CD permissions where credentials are required, but straight up file commit is like publicly announcing exactly where you left your house keys lol.

[–] 4am@lemmy.zip 3 points 1 hour ago* (last edited 1 hour ago)

Straight up file committing is like making a copy of your house keys for anyone who can see you at that moment and all moments thereafter lol

[–] whotookkarl@lemmy.dbzer0.com 34 points 2 hours ago

Imagine fucking up so bad security researchers think it must be an obvious honey pot until they see what the credentials give access to

[–] wonderingwanderer@sopuli.xyz 8 points 1 hour ago

Is this the same cybersecurity agency that fired all its professionals to replace them with sycophants?

[–] LovableSidekick@lemmy.world 4 points 1 hour ago* (last edited 1 hour ago) (1 children)

I'm surprised whatever software the keys were for didn't detect this and deactivate the keys. Discord did this automatically when I pushed a file to github that had a bot login token in it. Apparently Discord constantly scans github for such things, or maybe github does and sends Discord a msg, I dunno. But it was amazingly fast, like within 2 minutes.

[–] Wildmimic@anarchist.nexus 2 points 1 hour ago (1 children)

that feature was probably deactivated, just like the feature on github which prevents uploading of SSH keys that had been explicitly disabled

[–] LovableSidekick@lemmy.world 1 points 1 hour ago

No, I just checked - it's part of github's "Secret Scanning", which checks pushes for secret values and notifies partner services (like Discord) to deactivate them.

[–] getFrog@piefed.social 1 points 58 minutes ago

huh, so they've never used npm?

[–] pulsewidth@lemmy.world 118 points 5 hours ago (5 children)

Six months of exposure.

There is zero chance that the CISA systems have not been comprehensively breeched by every foreign adversary.

Good thing Trump cut 1/4 of their workforce last year. It's really paying dividends for Putin.

[–] SaveTheTuaHawk@lemmy.ca 39 points 4 hours ago (1 children)
[–] mPony@lemmy.world 11 points 3 hours ago (4 children)

that chain saw is not at the correct height

[–] smeenz@lemmy.nz 2 points 1 hour ago

It's only...what, about half a metre too high ?

load more comments (3 replies)
[–] homesweethomeMrL@lemmy.world 18 points 4 hours ago

All going to plan, comrade

load more comments (3 replies)
[–] Agent641@lemmy.world 1 points 1 hour ago (1 children)
[–] Bytemeister@lemmy.world 2 points 37 minutes ago

A container of sweet stuff that you get stuck in.

Basically, a system full of juicy looking data that takes forever to collect and process... And then it was all fake data the whole time.

Plus, you can hide some real info, like the name of the machine compromised, or info about the attacker's system in the data, and then when it gets compromised, sold on the black market, and eventually published, you can reference the leaked data to see exactly which system the hackers got into, and get some insights on how they did it.

[–] zd9@lemmy.world 70 points 4 hours ago (2 children)

jesus christ

This regime has caused so much damage to our national security, much of which we won't discover for years or decades. The Russians and Chinese (and literally anyone else) are probably fully infiltrated into our entire system in every aspect. SO fucking incompetent and corrupt.

[–] prole@lemmy.blahaj.zone 4 points 2 hours ago (1 children)

We're also creating generations of new enemies and potential "terrorists".

And Democrats will inevitably be blamed when they attack us in the future.

[–] zd9@lemmy.world 3 points 1 hour ago

I think we're headed towards a Troubles type scenario. Like a decade or more of stochastic terrorism, some organized groups, lots of violent suppression by the government, and further corporate capture of the state. I guess that's just the fascist end goal.

[–] henfredemars@lemdro.id 22 points 4 hours ago* (last edited 4 hours ago) (3 children)

We’re barely even trying with the massive cuts to cyber security. It’s almost the exact playbook you would use if leadership were actively hostile.

[–] Malyca@lemmy.zip 1 points 36 minutes ago

They are hostile, their mission is to destroy us

[–] zd9@lemmy.world 19 points 2 hours ago (1 children)

Trump and co are actively hostile to the US government though. There have been entire books written about how compromised he is. He's the perfect insider threat example: in debt to foreign powers, selfish and looking to make personal money, lies about his dealings, easily temptable with honeypot women (and Epstein girls, fucking sick), no allegiance or any form of duty to country or anything bigger than himself because he's a massive nihilist narcissist.

Really really scary times for anyone in America.

[–] Aqarius@lemmy.world 5 points 1 hour ago (1 children)

Don't worry, soon the folks in charge will come to the inevitable conclusion that the government systems are all compromised, so clearly the only solution is to privatise them and have thevNSA run by Palantir.

[–] Lost_My_Mind@lemmy.world 7 points 2 hours ago (1 children)

See, that's the thing. I always grew up with the phrase "Don't blame on malice what can be explained by incompetence".

But at a certain point, IS it incompetence anymore??? At this point it's starting to feel very very deliberate.

[–] kent_eh@lemmy.ca 3 points 2 hours ago

In this case it is both malice and incompetence acting together to create the worst possible outcomes.

[–] homesweethomeMrL@lemmy.world 62 points 5 hours ago* (last edited 5 hours ago) (8 children)

Valadon’s company constantly scans public code repositories at GitHub and elsewhere for exposed secrets, automatically alerting the offending accounts of any apparent sensitive data exposures. Valadon said he reached out because the owner in this case wasn’t responding and the information exposed was highly sensitive.

But wait

Valadon said the exposed CISA credentials represent a textbook example of poor security hygiene, noting that the commit logs in the offending GitHub account show that the CISA administrator disabled the default setting in GitHub that blocks users from publishing SSH keys or other secrets in public code repositories.

“Passwords stored in plain text in a csv, backups in git, explicit commands to disable GitHub secrets detection feature,” Valadon wrote in an email. “I honestly believed that it was all fake before analyzing the content deeper. This is indeed the worst leak that I’ve witnessed in my career. It is obviously an individual’s mistake, but I believe that it might reveal internal practices.”

One of the exposed files, titled “importantAWStokens,” included the administrative credentials to three Amazon AWS GovCloud servers.

This is shameful incompetence. Just head-rolling abysmal incompetence. These are the people they hired, for all you 1337 hax0rz currently looking.

[–] atomicbocks@sh.itjust.works 32 points 4 hours ago (1 children)

As a dev who’s been unemployed for 18 months your last sentence was pretty much my first thought when reading the article.

load more comments (1 replies)
[–] CosmicTurtle0@lemmy.dbzer0.com 6 points 3 hours ago (1 children)

Outside of the sheer incompetence of this administration, is there ANY chance this was done intentionally as a honeypot or something along those lines?

The fact that the commits were explicit along with bypassing all the checks could read as someone trying to see who knocks on the door.

[–] homesweethomeMrL@lemmy.world 8 points 3 hours ago

I don’t see it. Like the guy in the article said, it starts out looking like a joke . . . Buuuut it ain’t.

load more comments (6 replies)
[–] sp3ctr4l@lemmy.dbzer0.com 5 points 2 hours ago

Fast. Cheap. Good.

At best, pick 2.

This applies to code and coders as well, despite management's inability to comprehend reality.

[–] dhork@lemmy.world 26 points 4 hours ago (1 children)

Why are people acting surprised? This is exactly what DOGE intended to do.

load more comments (1 replies)
[–] demonsword@lemmy.world 139 points 6 hours ago* (last edited 6 hours ago) (2 children)

vibe code go brrrrrrr

EDIT: wow it's far worse, it was a single contractor that decided that his convenience was above any and all security recommendations ever written. Pure. Genius!

[–] wonderingwanderer@sopuli.xyz 3 points 1 hour ago

Contractor, eh?

How much do you wanna bet he has close personal ties to the trump family and zero cybersecurity experience?

[–] lIlIlIlIlIlIl@lemmy.world 47 points 6 hours ago (2 children)

Leaving passwords in plaintext has zero to do with “vibe coding”

[–] village604@adultswim.fan 55 points 6 hours ago

It definitely can if an LLM did it.

load more comments (1 replies)
[–] boatswain@infosec.pub 69 points 5 hours ago

Here's a link to the Krebs on Security article that Gizmodo used as a source: https://krebsonsecurity.com/2026/05/cisa-admin-leaked-aws-govcloud-keys-on-github/

[–] tomiant@piefed.social 9 points 3 hours ago (2 children)

Wow. Wowowowowowowowow. Wow.

load more comments (2 replies)
[–] wewbull@feddit.uk 2 points 2 hours ago* (last edited 1 hour ago) (2 children)

...but remember, everything needs to be written in memory safe languages to stop security breaches.

[–] gnufuu@infosec.pub 5 points 1 hour ago* (last edited 1 hour ago)

"I might get mugged in a dark alley, so why should I bother locking my door at home?"

[–] smeenz@lemmy.nz 1 points 1 hour ago

Security breeches stop your phone falling out while riding a horse.

[–] Professorozone@lemmy.world 3 points 3 hours ago

Defund DHS.

load more comments
view more: next ›