We stopped AI bot spam in our GitHub repo using Git's –author flag
Reaction to the --author / contributor-onboarding hack
- Many call it elegant and clever: it reuses GitHub’s “require prior contribution” plus a captcha to drastically reduce AI/bot PRs and issues.
- Clarifications: onboarding is triggered via the GitHub REST API; commits are co‑authored so GitHub recognizes the user as a contributor.
- Critiques:
- It shifts spam from PRs to many small commits; some note these now form a large fraction of the repo’s commit history.
- Question whether “click OK 10 times + captcha” just adds friction that motivated slop farms can still bypass.
- Concern about CI cost, since each onboarding commit runs the full pipeline.
GitHub’s role and missing tooling
- Strong sentiment that GitHub/Microsoft benefit from AI-driven activity and have little incentive to curb it.
- Requests for platform features:
- PR “staging” or moderation queues; draft-only PRs that only maintainers can mark ready.
- Better contributor metrics: PR rejection rate, cross-repo spam detection, AI/bot scores.
- Ability to delete or archive PRs (not just close), and “burn it with fire” actions that nuke all spammer activity at once.
- A GitHub representative mentions an upcoming “archive PRs” feature; maintainers argue pre‑moderation is more important.
Reputation, gating, and scoring ideas
- Suggestions: PR “tokens,” OTP-style access keys, vouching systems, trust circles, Elo/karma-like contributor scores.
- Pushback:
- Elo specifically is ill-suited and easily gamed; any scoring system risks cartels and state actors.
- New contributors get locked out; parallels drawn to Reddit karma and StackOverflow reputation.
Money, bounties, and perverse incentives
- Several link PR spam to bounties and to GitHub contributions being used as hiring signals.
- A controversial “Pfand” (deposit-per-PR) idea sparks long debate:
- Pro: forces skin in the game, filters bots and low-effort work.
- Con: burdens poor, young, unemployed, privacy-conscious contributors; enables scams and harassment; adds heavy payment/admin overhead.
Security, trust, and identity
- Using “prior contribution” as a security gate is questioned: once a trivial PR is merged, an attacker gains elevated trust.
- Some argue only org members should bypass approvals; others say if that’s enough to break you, your security model is already weak.
- One camp advocates real-name, non-anonymous GitHub to reduce bad-faith and bot activity; others note pseudonyms are now allowed even in major projects and that sophisticated attackers can still build fake reputations.
AI slop, OSS health, and irony
- Maintainers report that the majority of recent contributions are now useless LLM slop: verbose “plans” with trivial diffs or large, subtly broken patches.
- Some see the post (and its highly polished style) itself as LLM-generated “slop” complaining about slop, especially ironic from an AI-focused company whose tools could generate the same PRs.
- Broader worry: open source maintainers are being burned out cleaning AI spam while platform metrics (PR counts, “activity”) look great to investors.
Alternative anti-spam approaches
- Mentioned techniques:
- Proof-of-work / Hashcash-style schemes, broadly rejected as disadvantaging legitimate users and enriching botnet operators.
- Network- or mesh-style communication limits to prevent N‑to‑N spam (not concretely specified).
- A simple
AGENTS.mdfile instructing AI agents not to submit PR spam, relying on models auto‑reading it as context; reported as surprisingly effective “for now.”