Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exposed GitHub Copilot Flaw Risks Sensitive Data

Exposed GitHub Copilot Flaw Risks Sensitive Data

Posted on April 10, 2026 By CWS

An alarming vulnerability in GitHub Copilot Chat has been disclosed, revealing how attackers could covertly extract sensitive information from private repositories. This flaw, identified as CVE-2025-59145, carries a near-maximum CVSS score of 9.6, indicating its critical nature. It facilitated the unauthorized acquisition of source code, API keys, and cloud secrets without the need for executing malicious software.

The Emergence of CamoLeak

Known as ‘CamoLeak,’ this exploit underscores the increasing risks associated with AI-supported development environments. The vulnerability was publicly announced by a security researcher in October 2025, following GitHub’s August 2025 patch that aimed to neutralize the threat by disabling certain image rendering features in Copilot Chat.

GitHub Copilot Chat, a tool for reviewing pull requests, was exploited through its markdown comment syntax, which attackers used to conceal harmful instructions. These comments, invisible to human reviewers, were nevertheless processed by Copilot, misinterpreting them as legitimate commands.

Mechanics of the CamoLeak Exploit

The CamoLeak exploit operated through a four-phase attack. Initially, the attacker introduced a pull request (PR) embedded with hidden instructions. When a developer with access to private repositories requested a review from Copilot, they inadvertently activated the hidden commands.

The instructions directed Copilot to search the codebase for sensitive information, such as AWS keys, encoding this data in base16 and embedding it into pre-signed image URLs. As the victim’s browser loaded these images, the encoded data was transmitted back to the attacker’s server, reconstructing the information character by character.

Bypassing Security Measures

A notable feature of CamoLeak was its ability to circumvent GitHub’s Content Security Policy (CSP), which usually prevents data leakage by blocking images from untrusted sources. The attackers cleverly bypassed this by using a pre-computed dictionary of valid, signed addresses for GitHub’s Camo image proxy.

These addresses pointed to transparent 1×1 pixel images hosted on the attacker’s server, appearing as legitimate network traffic due to their routing through GitHub’s infrastructure. This sophisticated technique allowed the attack to evade standard network security measures.

While CamoLeak specifically targeted GitHub, the broader implications extend to any AI assistant with significant access permissions, such as Microsoft 365 Copilot or Google Gemini. The potential for untrusted content to manipulate AI instructions highlights the need for robust defenses against covert data exfiltration.

Cybersecurity experts emphasize the importance of evolving security strategies, focusing on endpoint protection to disrupt the attack chain. Solutions like BlackFog’s ADX platform offer proactive monitoring of outbound traffic, blocking unauthorized data transfers initiated by attackers or compromised AI systems.

Stay updated with the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Reach out to share your cybersecurity stories.

Cyber Security News Tags:AI assistants, AI development, API keys, CamoLeak, cloud secrets, Content-Security-Policy, Copilot, CVE-2025-59145, Cybersecurity, data security, GitHub, security patch, source code theft, Vulnerability

Post navigation

Previous Post: Android Crypto Wallets at Risk Due to SDK Flaw
Next Post: HPE Aruba 5G Vulnerability Allows Credential Theft

Related Posts

Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News
SafePay Ransomware Infected 260+ Victims Across Multiple Countries SafePay Ransomware Infected 260+ Victims Across Multiple Countries Cyber Security News
Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks Cyber Security News
ChatGPT Down – Users Report Outage Worldwide, Conversations Disappeared for Users ChatGPT Down – Users Report Outage Worldwide, Conversations Disappeared for Users Cyber Security News
Critical Cybersecurity Threats: PayPal, Chrome, BeyondTrust Critical Cybersecurity Threats: PayPal, Chrome, BeyondTrust Cyber Security News
10 Best Cloud Penetration Testing Companies in 2025 10 Best Cloud Penetration Testing Companies in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit AiTM to Misdirect Employee Salaries
  • EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
  • HPE Aruba 5G Vulnerability Allows Credential Theft
  • Exposed GitHub Copilot Flaw Risks Sensitive Data
  • Android Crypto Wallets at Risk Due to SDK Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit AiTM to Misdirect Employee Salaries
  • EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
  • HPE Aruba 5G Vulnerability Allows Credential Theft
  • Exposed GitHub Copilot Flaw Risks Sensitive Data
  • Android Crypto Wallets at Risk Due to SDK Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark