GitHub security breach investigation revealed customers’ repositories were unaffected. The company shared this update on Wednesday.
This news comes as crypto developers double‑check their API keys. Some are even rotating them after Binance founder Changpeng “CZ” Zhao issued a warning.
GitHub reveals investigation details after breach
Microsoft‑owned GitHub disclosed the breach on May 20. An attacker gained unauthorized access to internal repositories.
How did it happen? A poisoned VS Code extension appeared on an employee’s device. GitHub detected and contained the threat immediately.
“We removed the malicious extension version, isolated the endpoint, and began incident response immediately,” the company said.
After an initial investigation, GitHub confirmed that only its internal repositories were affected. That means customer data, enterprises, organizations, and repositories remain safe. Crypto projects’ repositories are also secure.
Furthermore, the company revealed that the attacker impacted 3,800 repositories. This matches the attacker’s own claims. GitHub has already rotated critical secrets, prioritizing the highest‑impact credentials first.
The firm will continue analyzing logs, validating secret rotation, and monitoring for follow‑on activity. A full report will come after completing the investigation.
GitHub security breach: What developers need to know
Binance founder Changpeng Zhao urged crypto developers to act immediately. “If you have API keys in your code, even private repos, now is the time to double check and change them,” he warned.
Why the urgency? Crypto developers rely heavily on GitHub for open‑source and private development. They often store exchange API keys, wallet credentials, and infrastructure tokens in repositories. These keys power bots, trading scripts, DeFi protocols, and blockchain tools.
Recent major hacks, such as Drift Protocol and KelpDAO, show the rising risks. In addition, a threat group called TeamPCP claimed responsibility for this breach. The group is attempting to sell data from roughly 4,000 GitHub internal repositories for a minimum of $50,000.
How to protect your keys
Crypto security experts urge developers to take several steps. First, rotate all keys immediately. Second, scan for hardcoded secrets using tools like GitHub Secret Scanning, gitleaks, or Trivy. Third, move away from committing keys entirely.