By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researcher Unearths Thousands of Leaked Secrets in GitHub’s “Oops Commits”
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Researcher Unearths Thousands of Leaked Secrets in GitHub’s “Oops Commits”
News

Researcher Unearths Thousands of Leaked Secrets in GitHub’s “Oops Commits”

News Room
Last updated: 2025/09/04 at 8:32 AM
News Room Published 4 September 2025
Share
SHARE

Security researcher Sharon Brizinov, in collaboration with Truffle Security, has conducted a sweeping investigation of GitHub’s “oops commits”, force-pushed or deleted commits that remain archived, and uncovered thousands of secrets left behind, including high-value tokens and admin-level credentials. The team also released an open-source tool to help others scan their own repositories for such hidden leakages.

GitHub retains every public commit, even those developers attempt to erase through force pushes, as “zero-commit” PushEvents in its archive. By scanning all of these dangling commits since 2020 using data from GitHub Archive, Brizinov discovered secrets that led to approximately $25,000 in bug bounty rewards, particularly exposing GitHub PATs and AWS credentials that could have led to wide-ranging supply-chain attacks.

To empower the community, Truffle Security and Brizinov co-developed the Force Push Scanner, an open-source tool that identifies and scans orphaned commits within your GitHub organization or user account. It mines the GH Archive dataset using BigQuery and applies TruffleHog scanning to uncover hidden secrets and vulnerabilities.

The findings were staggering: a large volume of active secrets, such as MongoDB credentials and API tokens, were found in .env and common config files. One particularly alarming case involved a GitHub Personal Access Token with admin permissions over the Istio repositories, posing a massive potential for a supply-chain compromise, though the token was swiftly revoked following responsible disclosure.

Community reaction highlights the broader implications: developers and security professionals noted that commits intended to be removed are often still accessible. One user commented, “There isn’t a proven way to delete a commit once it leaves your machine… you have to assume it’s permanently exposed”, underscoring the dangers of making assumptions about deletion.

This research challenges the notion that force-pushed Git history is private. Any secret committed, even unknowingly, should be deemed compromised and immediately revoked. Truffle Security’s Force Push Scanner adds instrumentation to detect lingering vulnerabilities from prior commits before they cause widespread damage.

To prevent secret leaks, developers should prioritize using secret management tools and environment variables instead of hardcoding credentials. Storing secrets in secure platforms like HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault ensures sensitive data never enters the codebase while providing centralized control over access. Alongside this, enforcing secret scanning at multiple stages, both locally with pre-commit hooks and in CI/CD pipelines, is critical. Tools like TruffleHog, Gitleaks, or Detect Secrets can detect exposed credentials early, and regular historical scans help uncover secrets hidden in older commits.

When a secret is exposed, it should always be treated as compromised. Immediate revocation and rotation of credentials, ideally through automated processes or dynamic secret systems, minimizes the risk window. This should be paired with strict access controls guided by the principle of least privilege, ensuring developers and services only access the credentials they truly need. Additionally, enabling GitHub’s push protection can prevent secrets from being committed in the first place, and history-cleaning tools like git filter-repo can be used cautiously when policy allows.

Beyond tools and automation, creating a strong security culture is essential. Teams should be trained to recognize the risks of committing secrets and adopt safe handling practices, such as secure storage, regular scanning, and key rotation. By combining technical safeguards with cultural change, teams can significantly reduce the risk of secret exposure and make secure coding practices a default part of their workflows.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What to know about Russia’s GPS jamming operation in Europe
Next Article Build a Web Music Player With the Spotify API
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

TCL’s NXTPAPER 60 Ultra Is The Industry’s First Phone With A Natural Light, Zero-Flicker Display – BGR
News
You will not have to sell Chrome and paralyze a fine in the EU
Mobile
This AC adapter splits in two, giving you a wireless power bank for the road
News
HIP-RT Update For Blender 5.0 To Deliver Improved Ray-Tracing On RDNA4 GPUs
Computing

You Might also Like

News

TCL’s NXTPAPER 60 Ultra Is The Industry’s First Phone With A Natural Light, Zero-Flicker Display – BGR

5 Min Read
News

This AC adapter splits in two, giving you a wireless power bank for the road

2 Min Read
News

Trump to host tech CEOs for first event in newly renovated Rose Garden

5 Min Read
News

TCL announces the Nxtpaper 60 Ultra — a phone your eyes will be thankful for

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?