May 20, 2026
ManyPress
Technology

In stunning display of stupid, secret CISA credentials found in public GitHub repo

Security researcher Brian Krebs brings us the news that America’s Cybersecurity & Infrastructure Agency (CISA) has had a large store of plaintext passwords, SSH private keys, tokens, and “other sensit

NF

ManyPress Editorial Team

ManyPress Editorial

May 19, 2026 · 6:27 PM2 min readSource: Ars Technica
In stunning display of stupid, secret CISA credentials found in public GitHub repo

Security researcher Brian Krebs brings us the news that America’s Cybersecurity & Infrastructure Agency (CISA) has had a large store of plaintext passwords, SSH private keys, tokens, and “other sensitive CISA assets” exposed in a public GitHub repo since at least November 2025. The now-offline public repo—named, somewhat aspirationally, “Private-CISA”—was brought to Krebs’ attention by GitGuardian’s Guillaume Valadon , who was alerted to the repo’s presence by GitGuardian’s public code scans. Kr

In an email to Krebs, Valadon claimed that the repo’s commit logs show that GitHub’s default protections against committing secrets—protections designed to protect unwitting or unskilled developers against exactly this kind of stupidness—had been disabled by the repo’s administrator. Testing by Seralys founder Philippe Caturegli showed that this was not a joke or hoax and that he was able to use the credentials in the Private-CISA repo to gain access to multiple Amazon Web Services GovCloud accounts “at a high privilege level.” Krebs notes that the repo appeared to be managed by Virginia-based Nightwing , a CISA contractor. Nightwing has so far not commented publicly, instead referring questions back to CISA. This isn’t the first time CISA has screwed up—in fact, it’s not even the first time this year . In January, polygraph-failing acting CISA Director Madhu Gottumukkala uploaded sensitive government documents to ChatGPT after demanding and receiving an exemption to the agency policy that prohibited ChatGPT’s use by CISA personnel. Gottumukkala was removed from his role in February .

Key points

  • In an email to Krebs, Valadon claimed that the repo’s commit logs show that GitHub’s default protections against committing secrets—protections designed to protect unwitting or unskilled developers…
  • Testing by Seralys founder Philippe Caturegli showed that this was not a joke or hoax and that he was able to use the credentials in the Private-CISA repo to gain access to multiple Amazon Web Serv…
  • Nightwing has so far not commented publicly, instead referring questions back to CISA.
  • This isn’t the first time CISA has screwed up—in fact, it’s not even the first time this year .
  • In January, polygraph-failing acting CISA Director Madhu Gottumukkala uploaded sensitive government documents to ChatGPT after demanding and receiving an exemption to the agency policy that prohibi…

AdvertisementAd Placeholder — Configure AdSense in .env.localNEXT_PUBLIC_ADSENSE_CLIENT=ca-pub-XXXXXXXX

This article was independently rewritten by ManyPress editorial AI from reporting originally published by Ars Technica.

Technology