this post was submitted on 19 May 2026
794 points (99.4% liked)

Technology

84796 readers
4255 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] Marshezezz@lemmy.blahaj.zone 19 points 13 hours ago (1 children)

We could just burn everything down and return to jungle law where the fascists will realize really quick how coddled they’ve been in life

[–] mynameisbob@lemmy.ml 6 points 10 hours ago

U.S. Cybersecurity Agency == Chat_gipity_techno_turds or short version doge_after_birth... like top jorb in the land man...or should be. Always running from or running to. Constipation or diarrhea

[–] Mulligrubs@lemmy.world 19 points 15 hours ago* (last edited 15 hours ago)

Passwords were stored as plain text in a public GitHub repository.

Governments and corporations are made up of people, and when people see other people treated like garbage, they tend to become less diligent in their own duties, and loyalty is thrown out the window. Revenge is never off the table.

Also, even if you get rid of everybody so that no witnesses of your injustice remain, you've filled those positions with neophytes, who are incompetent for quite some time (at least).

that's the notorious "double whammy catch-22 fuck around find out" phenomenon, a TRIPLE THREAT

[–] dreadbeef@lemmy.dbzer0.com 49 points 20 hours ago (1 children)

This isnt a leak. This is incompetency.

[–] LodeMike@lemmy.today 12 points 14 hours ago (1 children)

"Store gets robbed after owner leaves door wide open at night"

[–] dreadbeef@lemmy.dbzer0.com 3 points 5 hours ago

"Store owner invited robbers at night to steal their own goods" is how this article would word that

[–] mlg@lemmy.world 84 points 1 day ago* (last edited 23 hours ago) (3 children)

GitHub gets autoscanned by thousands of malicious actors for keys and credentials on every commit, including the comments lol.

The fact that CISA themselves never saw an automated breach attempt only minutes after pushing to github is the more interesting story here.

Either the contractor is so incompetent that they didn't have any logging set up and the breach went completely unnoticed for 6 months.

Or this really is some fat honeypot that they won't admit is a honeypot because they've been using it to watch or bait APTs.

Currently, there is no indication that any sensitive data was compromised as a result of this incident

This is literally impossible unless it really was a honeypot. You can demo this yourself in real time. Make a throwaway cloud account on your favorite provider, commit the cloud auth token into a repo, and you will see an automated bot login within minutes.

Commiting any secrets to a public repo should just be considered auto compromised because of how potent it is.

That stuff ususlly gets exposed via poor CI/CD permissions where credentials are required, but straight up file commit is like publicly announcing exactly where you left your house keys lol.

[–] Ironfacebuster@lemmy.world 30 points 20 hours ago (1 children)

Can confirm, with one of my first discord bots I accidentally committed the token and within a day someone logged in and announced in every server it was in that the token was compromised

[–] Taldan@lemmy.world 28 points 15 hours ago

Based greyhat

[–] trackball_fetish@lemmy.wtf 8 points 20 hours ago

My first thought was that sounds intentional..

load more comments (1 replies)
[–] pulsewidth@lemmy.world 196 points 1 day ago (3 children)

Six months of exposure.

There is zero chance that the CISA systems have not been comprehensively breeched by every foreign adversary.

Good thing Trump cut 1/4 of their workforce last year. It's really paying dividends for Putin.

[–] SaveTheTuaHawk@lemmy.ca 87 points 1 day ago (1 children)
[–] mPony@lemmy.world 28 points 1 day ago (4 children)

that chain saw is not at the correct height

load more comments (4 replies)
[–] homesweethomeMrL@lemmy.world 25 points 1 day ago

All going to plan, comrade

[–] henfredemars@lemdro.id 17 points 1 day ago (2 children)

Breached? But we left the keys in the ignition and the door was wide open. We could have, you know, tried.

[–] flandish@lemmy.world 13 points 1 day ago (1 children)

reminds me of when i lived in nashville and there had to be news bulletins reminding people to not leave firearms in their cars, as they were getting stolen.

[–] MajorasTerribleFate@lemmy.zip 8 points 20 hours ago (1 children)

For a moment, I chose to imagine the danger was that your unattended firearm would steal your unattended car.

load more comments (1 replies)
load more comments (1 replies)
[–] whotookkarl@lemmy.dbzer0.com 68 points 1 day ago

Imagine fucking up so bad security researchers think it must be an obvious honey pot until they see what the credentials give access to

[–] demonsword@lemmy.world 208 points 1 day ago* (last edited 1 day ago) (3 children)

vibe code go brrrrrrr

EDIT: wow it's far worse, it was a single contractor that decided that his convenience was above any and all security recommendations ever written. Pure. Genius!

[–] lIlIlIlIlIlIl@lemmy.world 69 points 1 day ago (2 children)

Leaving passwords in plaintext has zero to do with “vibe coding”

[–] village604@adultswim.fan 79 points 1 day ago (1 children)

It definitely can if an LLM did it.

[–] wucking_feardo@lemmy.world 7 points 20 hours ago

I agree and to expand the same point. Even if the llm didn't do it, it's entirely plausible the LLM recommended it and the dev just drank that coolaid

[–] demonsword@lemmy.world 26 points 1 day ago

yeah, and this is why I edited my original post after reading the article.

[–] wonderingwanderer@sopuli.xyz 16 points 23 hours ago

Contractor, eh?

How much do you wanna bet he has close personal ties to the trump family and zero cybersecurity experience?

[–] crusa187@lemmy.ml 43 points 1 day ago (1 children)
[–] nymnympseudonym@piefed.social 6 points 20 hours ago

You know what's ironic? FedRAMP rules dictate that Thou Must Scan Thy Repos for Secrets (tokens, passwords, etc)

GitHub, ButrBucket, etc all have this out of the box for enterprise customers

https://support.atlassian.com/bitbucket-data-center/kb/how-to-scan-for-and-remove-passwords-or-secrets-in-bitbucket-server-repositories/

[–] zd9@lemmy.world 110 points 1 day ago (3 children)

jesus christ

This regime has caused so much damage to our national security, much of which we won't discover for years or decades. The Russians and Chinese (and literally anyone else) are probably fully infiltrated into our entire system in every aspect. SO fucking incompetent and corrupt.

[–] henfredemars@lemdro.id 45 points 1 day ago* (last edited 1 day ago) (3 children)

We’re barely even trying with the massive cuts to cyber security. It’s almost the exact playbook you would use if leadership were actively hostile.

[–] zd9@lemmy.world 48 points 1 day ago (1 children)

Trump and co are actively hostile to the US government though. There have been entire books written about how compromised he is. He's the perfect insider threat example: in debt to foreign powers, selfish and looking to make personal money, lies about his dealings, easily temptable with honeypot women (and Epstein girls, fucking sick), no allegiance or any form of duty to country or anything bigger than himself because he's a massive nihilist narcissist.

Really really scary times for anyone in America.

[–] Aqarius@lemmy.world 19 points 23 hours ago (1 children)

Don't worry, soon the folks in charge will come to the inevitable conclusion that the government systems are all compromised, so clearly the only solution is to privatise them and have thevNSA run by Palantir.

[–] Lost_My_Mind@lemmy.world 18 points 1 day ago (1 children)

See, that's the thing. I always grew up with the phrase "Don't blame on malice what can be explained by incompetence".

But at a certain point, IS it incompetence anymore??? At this point it's starting to feel very very deliberate.

[–] kent_eh@lemmy.ca 12 points 1 day ago

In this case it is both malice and incompetence acting together to create the worst possible outcomes.

load more comments (1 replies)
load more comments (2 replies)
[–] homesweethomeMrL@lemmy.world 94 points 1 day ago* (last edited 1 day ago) (12 children)

Valadon’s company constantly scans public code repositories at GitHub and elsewhere for exposed secrets, automatically alerting the offending accounts of any apparent sensitive data exposures. Valadon said he reached out because the owner in this case wasn’t responding and the information exposed was highly sensitive.

But wait

Valadon said the exposed CISA credentials represent a textbook example of poor security hygiene, noting that the commit logs in the offending GitHub account show that the CISA administrator disabled the default setting in GitHub that blocks users from publishing SSH keys or other secrets in public code repositories.

“Passwords stored in plain text in a csv, backups in git, explicit commands to disable GitHub secrets detection feature,” Valadon wrote in an email. “I honestly believed that it was all fake before analyzing the content deeper. This is indeed the worst leak that I’ve witnessed in my career. It is obviously an individual’s mistake, but I believe that it might reveal internal practices.”

One of the exposed files, titled “importantAWStokens,” included the administrative credentials to three Amazon AWS GovCloud servers.

This is shameful incompetence. Just head-rolling abysmal incompetence. These are the people they hired, for all you 1337 hax0rz currently looking.

[–] atomicbocks@sh.itjust.works 44 points 1 day ago (1 children)

As a dev who’s been unemployed for 18 months your last sentence was pretty much my first thought when reading the article.

load more comments (1 replies)
[–] AA5B@lemmy.world 7 points 20 hours ago

“Mistake”. Yeah, no. That’s someone thinking policies aren’t meant for them and blindly taking the easiest path. Sounds just like those 1337 hax0rs they gave the keys to

In a sane world this should get clearances revoked so they never again deal with any private data

load more comments (10 replies)
[–] wonderingwanderer@sopuli.xyz 29 points 23 hours ago

Is this the same cybersecurity agency that fired all its professionals to replace them with sycophants?

[–] boatswain@infosec.pub 83 points 1 day ago

Here's a link to the Krebs on Security article that Gizmodo used as a source: https://krebsonsecurity.com/2026/05/cisa-admin-leaked-aws-govcloud-keys-on-github/

[–] SabinStargem@lemmy.today 9 points 19 hours ago
[–] dhork@lemmy.world 35 points 1 day ago (3 children)

Why are people acting surprised? This is exactly what DOGE intended to do.

load more comments (3 replies)
[–] db2@lemmy.world 36 points 1 day ago (2 children)
load more comments (2 replies)
[–] BaroqueInMind@piefed.social 28 points 1 day ago (3 children)

Its dumb shit like this that reassures me that AI will definitely take over cyber security jobs and make shit even LESS secure than everything already is.

load more comments (3 replies)
load more comments
view more: next ›