GitHub is investigating unauthorized access to their internal repositories

Perceived causes and role of AI

  • Several commenters note a surge in security incidents in the last months and link it to more capable LLMs.
  • Many argue attackers are now heavily using LLMs to find vulnerabilities and build exploits; some say this is effectively universal among serious exploit developers.
  • Others stress the “defender” side: AI‑generated “slop PRs” and management pressure for speed are degrading code quality and reviews, likely adding new vulnerabilities.

Attack vector and scope (as discussed)

  • Thread consensus: a Microsoft developer installed a malicious VS Code extension from the official marketplace; malware exfiltrated credentials, which were then used to clone internal GitHub repos.
  • GitHub states ~3,800 internal repositories were accessed; posters debate how “directionally consistent” and how bad that is.
  • Ransom group reportedly claims to have copied and is selling all internal repos; some mention file listings that include law-enforcement portals and abuse‑related tooling.
  • Whether any customer data or customer repos are impacted remains described as unknown / “no evidence so far.”

Source access in the LLM era

  • Multiple comments note that leaked source was already dangerous pre‑AI, but LLMs now make large‑scale code review and vuln‑hunting easier.
  • Some assume GitHub likely already scans its own code with AI tools, but others are skeptical that this meaningfully reduces risk.

Developer access and internal repo sprawl

  • Many companies give developers read access to all internal code (“inner source”) to boost productivity and understanding; some see that as normal and necessary.
  • Others question why one developer’s credentials allowed access to thousands of repos and view this as a failure of least‑privilege design.
  • There’s debate over how to balance fast development with tighter access controls and JIT permissions.

VS Code extensions and permission models

  • Strong criticism that VS Code extensions, especially “themes,” have broad, unsandboxed capabilities and no robust permission model.
  • Some call for extension sandboxing, explicit permissions (especially for themes), running IDEs in containers/VMs, and restricting outbound network access.
  • Others note that as long as an IDE can reach git and hold SSH/tokens, compromised extensions can do damage.

GitHub Actions and supply‑chain hardening

  • Multiple practical tips: use security linters (e.g., zizmor for GitHub Actions), delay package adoption, firewall npm installs in CI, disable auto‑updates for IDE/AI extensions.
  • Template injection in GitHub Actions (e.g., PR titles flowing into shell) is cited as a known class of exploit.

Communication channel criticism

  • Many dislike that the only initial disclosure was on X/Twitter, which now often requires login and is blocked in some enterprises.
  • Suggestions include: status page and blog posts on github.com, direct email to org owners, and mirroring to more open platforms (e.g., Bluesky, RSS).

Reactions: trust, cloud skepticism, and alternatives

  • Some say this is another in a string of Microsoft/GitHub issues and plan to leave; others argue GitHub remains the “least bad” hosted forge.
  • Interest in self‑hosting (Forgejo, Gitea) is high; proponents cite lower cost, smaller attack surface, and more control over dependencies and infra.
  • A few advocate generally moving off centralized SaaS/cloud for critical dev infrastructure, given growing supply‑chain and ecosystem risks.