GitHub’s Dirty Little Secret: How Deleted Files Led to a $64K Bug Bounty Bonanza!

Security researcher Sharon Brizinov pocketed $64,000 by exposing the hilarious truth that deleted files in GitHub repositories aren’t really gone. Git’s commitment to eternal file storage means secrets like API keys can lurk indefinitely, waiting to be rediscovered. Developers, beware: Git has a better memory than your grandma at Christmas.

Pro Dashboard

Hot Take:

Who knew that GitHub could be the land of forgotten secrets? Sharon Brizinov just made $64,000 by playing digital archaeologist, dusting off hidden treasures from deleted files in public repositories. GitHub: where secrets go to retire… or get rediscovered by eagle-eyed researchers!

Key Points:

  • Sharon Brizinov earned $64,000 by unearthing secrets in deleted files from public GitHub repositories.
  • Deleted files in Git repositories can still be accessed because Git retains a complete history of changes.
  • Brizinov built a tool to automate the process of finding and restoring these deleted files to check for secrets.
  • His findings included leaked API keys, tokens, and credentials, especially from repositories with over 5,000 stars.
  • Developers are advised to rotate compromised secrets and understand Git’s history retention to avoid leaks.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?