Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN

GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN

Posted on February 24, 2026 By CWS

A recent security flaw in GitHub Codespaces presented an opportunity for hackers to gain unauthorized control over repositories. This vulnerability, identified as RoguePilot by Orca Security, involved the misuse of GitHub Copilot to execute harmful instructions. The flaw has been addressed by Microsoft after responsible disclosure.

Understanding the Vulnerability

The issue stemmed from a vulnerability that allowed hidden instructions within a GitHub issue to be processed by GitHub Copilot. This process enabled unauthorized actions in Codespaces, potentially compromising the GITHUB_TOKEN. Security expert Roi Nisimi explained that this vulnerability represents a passive prompt injection scenario, where malicious instructions embedded in content guide the large language model (LLM) to unintended outcomes.

The flaw was classified as an AI-mediated supply chain attack. Attackers could embed harmful instructions in developer content, such as a GitHub issue, which would automatically execute when Copilot processed the data. This breach of trust in AI assistants could result in sensitive data leaks.

Exploiting GitHub Codespaces

RoguePilot exploited multiple entry points to initiate a Codespaces environment, including templates and issues. The problem arose when a codespace was launched from an issue, automatically feeding Copilot the issue’s description. This integration allowed for the execution of harmful commands, potentially exfiltrating GITHUB_TOKENs to external servers.

Nisimi highlighted that attackers could manipulate Copilot to check out a crafted pull request with a symbolic link to an internal file. This would lead Copilot to read and exfiltrate sensitive data, revealing the vulnerability of AI-assisted workflows.

Broader Implications and Future Concerns

Microsoft’s research uncovered further vulnerabilities, such as Group Relative Policy Optimization (GRPO), which could undermine safety features of LLMs. It was found that minimal prompts could significantly alter model behavior across various harmful categories. This discovery raises concerns about the reliability of AI models in maintaining security standards.

Additionally, new research revealed side channels that could infer user conversation topics and fingerprint queries with high accuracy. Techniques like ShadowLogic, which backdoor at the computational graph level, pose risks to agentic AI systems, allowing attackers to intercept and manipulate data requests covertly.

Emerging Threats and Defensive Measures

Recent demonstrations, such as the Semantic Chaining jailbreak attack, highlight the evolving threat landscape. This method enables bypassing safety filters in AI models by leveraging multi-stage image modifications. Attackers can gradually erode a model’s defenses by executing a sequence of seemingly innocuous instructions.

Researchers have introduced the concept of promptware, a new class of malware that exploits LLMs through engineered prompts. Promptware can facilitate various stages of cyber attacks, manipulating LLMs to execute harmful activities by exploiting application contexts and permissions.

As AI models become integral to digital infrastructures, the importance of robust security measures and vigilant monitoring cannot be overstated. Continuous research and development of defensive strategies are crucial to safeguarding against these sophisticated threats.

The Hacker News Tags:AI security, AI-mediated attack, Codespaces vulnerability, Copilot flaw, GitHub, GITHUB_TOKEN, Orca Security, prompt injection, RoguePilot, supply chain attack

Post navigation

Previous Post: ASP.NET Developers Targeted by Malicious NuGet Packages
Next Post: New Tactics by AMOS Malware Target Apple Users

Related Posts

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections The Hacker News
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data The Hacker News
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms The Hacker News
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access The Hacker News
Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants The Hacker News
How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Tactics by AMOS Malware Target Apple Users
  • GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
  • ASP.NET Developers Targeted by Malicious NuGet Packages
  • AI-Powered Cyber Attacks Accelerate Threat Landscape
  • Ransomware Hits 65% of Financial Firms in 2024

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Tactics by AMOS Malware Target Apple Users
  • GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
  • ASP.NET Developers Targeted by Malicious NuGet Packages
  • AI-Powered Cyber Attacks Accelerate Threat Landscape
  • Ransomware Hits 65% of Financial Firms in 2024

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News