Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN

GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN

Posted on February 24, 2026 By CWS

A recent security flaw in GitHub Codespaces presented an opportunity for hackers to gain unauthorized control over repositories. This vulnerability, identified as RoguePilot by Orca Security, involved the misuse of GitHub Copilot to execute harmful instructions. The flaw has been addressed by Microsoft after responsible disclosure.

Understanding the Vulnerability

The issue stemmed from a vulnerability that allowed hidden instructions within a GitHub issue to be processed by GitHub Copilot. This process enabled unauthorized actions in Codespaces, potentially compromising the GITHUB_TOKEN. Security expert Roi Nisimi explained that this vulnerability represents a passive prompt injection scenario, where malicious instructions embedded in content guide the large language model (LLM) to unintended outcomes.

The flaw was classified as an AI-mediated supply chain attack. Attackers could embed harmful instructions in developer content, such as a GitHub issue, which would automatically execute when Copilot processed the data. This breach of trust in AI assistants could result in sensitive data leaks.

Exploiting GitHub Codespaces

RoguePilot exploited multiple entry points to initiate a Codespaces environment, including templates and issues. The problem arose when a codespace was launched from an issue, automatically feeding Copilot the issue’s description. This integration allowed for the execution of harmful commands, potentially exfiltrating GITHUB_TOKENs to external servers.

Nisimi highlighted that attackers could manipulate Copilot to check out a crafted pull request with a symbolic link to an internal file. This would lead Copilot to read and exfiltrate sensitive data, revealing the vulnerability of AI-assisted workflows.

Broader Implications and Future Concerns

Microsoft’s research uncovered further vulnerabilities, such as Group Relative Policy Optimization (GRPO), which could undermine safety features of LLMs. It was found that minimal prompts could significantly alter model behavior across various harmful categories. This discovery raises concerns about the reliability of AI models in maintaining security standards.

Additionally, new research revealed side channels that could infer user conversation topics and fingerprint queries with high accuracy. Techniques like ShadowLogic, which backdoor at the computational graph level, pose risks to agentic AI systems, allowing attackers to intercept and manipulate data requests covertly.

Emerging Threats and Defensive Measures

Recent demonstrations, such as the Semantic Chaining jailbreak attack, highlight the evolving threat landscape. This method enables bypassing safety filters in AI models by leveraging multi-stage image modifications. Attackers can gradually erode a model’s defenses by executing a sequence of seemingly innocuous instructions.

Researchers have introduced the concept of promptware, a new class of malware that exploits LLMs through engineered prompts. Promptware can facilitate various stages of cyber attacks, manipulating LLMs to execute harmful activities by exploiting application contexts and permissions.

As AI models become integral to digital infrastructures, the importance of robust security measures and vigilant monitoring cannot be overstated. Continuous research and development of defensive strategies are crucial to safeguarding against these sophisticated threats.

The Hacker News Tags:AI security, AI-mediated attack, Codespaces vulnerability, Copilot flaw, GitHub, GITHUB_TOKEN, Orca Security, prompt injection, RoguePilot, supply chain attack

Post navigation

Previous Post: ASP.NET Developers Targeted by Malicious NuGet Packages
Next Post: New Tactics by AMOS Malware Target Apple Users

Related Posts

Trojanized Gaming Tools Spread Java RAT via Online Platforms Trojanized Gaming Tools Spread Java RAT via Online Platforms The Hacker News
New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper The Hacker News
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora The Hacker News
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature The Hacker News
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign The Hacker News
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Enhances Chrome Security with Device-Bound Sessions
  • Law Enforcement’s Use of Webloc for Global Device Tracking
  • AI-Powered Cyberattack Compromises Mexican Government Agencies
  • Rise of Advanced EDR Killers in Ransomware Attacks
  • Claude AI Enhances Microsoft Word with New Beta Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Enhances Chrome Security with Device-Bound Sessions
  • Law Enforcement’s Use of Webloc for Global Device Tracking
  • AI-Powered Cyberattack Compromises Mexican Government Agencies
  • Rise of Advanced EDR Killers in Ransomware Attacks
  • Claude AI Enhances Microsoft Word with New Beta Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark