AI-POWERED NEWS

30+ sources. Zero spin.

Cross-referenced, unbiased news. Both sides of every story.

← Back to headlines

A CISA Contractor Posted Admin Passwords for U.S. Cybersecurity Infrastructure to a Public GitHub Repo

A CISA Contractor Posted Admin Passwords for U.S. Cybersecurity Infrastructure to a Public GitHub Repo
The agency responsible for protecting America's critical digital infrastructure had its own AWS GovCloud credentials, plaintext passwords, and internal system keys sitting wide open on GitHub — disabled security protections and all. A private security researcher flagged it because the contractor wasn't responding. This isn't a hack story. It's a gross negligence story.

The Agency That Secures America Left Its Own Keys on the Doorstep

The Cybersecurity & Infrastructure Security Agency — CISA — exists for one reason: to protect U.S. government systems from exactly this kind of breach.

They failed. At themselves.

Until this past weekend, a CISA contractor ran a public GitHub repository called "Private-CISA" — yes, that's what it was named — that contained administrative credentials to three Amazon AWS GovCloud servers, plaintext usernames and passwords for dozens of internal CISA systems, cloud tokens, SSH keys, and detailed internal logs showing how the agency builds, tests, and deploys its own software.

How Bad Was It? The Researchers Say "Career Worst"

Guillaume Valadon, a researcher at the security firm GitGuardian, discovered the exposure on May 15 and contacted KrebsOnSecurity because the contractor wasn't responding to GitGuardian's automated alerts.

Valadon didn't mince words: "This is indeed the worst leak that I've witnessed in my career."

His firm scans public code repositories continuously for exposed secrets. This one stopped them cold.

The exposed files included one literally named "importantAWStokens" — containing admin credentials to three GovCloud servers. Another, "AWS-Workspace-Firefox-Passwords.csv", listed plaintext usernames and passwords for dozens of internal systems in a spreadsheet.

A spreadsheet. Plaintext. On a public repo.

The Contractor Actively Made It Worse

This wasn't just carelessness. It was compounded carelessness.

According to Valadon, the commit logs show the CISA contractor deliberately disabled GitHub's default secret-scanning protection — the built-in feature that blocks users from accidentally publishing SSH keys or credentials.

They turned off the safety net. Then they drove off the bridge.

Valadon described it bluntly: "Passwords stored in plain text in a csv, backups in git, explicit commands to disable GitHub secrets detection feature." He said he initially thought the whole repository was fake — a honeypot, maybe — because no real government cybersecurity professional could be this sloppy.

It was real.

What Was Exposed, Specifically

Philippe Caturegli, founder of security consultancy Seralys, independently tested the exposed AWS keys to verify they were valid and determine what access they granted. He confirmed they worked.

One of the systems exposed was "LZ-DSO" — short for Landing Zone DevSecOps — CISA's own secure code development environment. The agency's secure development infrastructure. Protected by credentials sitting in a public GitHub repo.

Caturegli noted the account showed a consistent pattern: someone using a professional repository like a personal scratchpad, mixing a CISA-associated email address with a personal one. Sloppy habits baked into standard practice.

What Mainstream Coverage Is Missing

Most coverage treats this as a straightforward "oops, credential leak" story and misses what matters.

This isn't about one contractor having a bad day. Valadon observed: "It is obviously an individual's mistake, but I believe that it might reveal internal practices."

If a single CISA contractor could disable secret-scanning protections, store admin credentials in plaintext CSVs, back up sensitive internal systems to a public repo, and do it long enough that an outside security firm had to call a journalist to get anyone's attention — then CISA has a systemic oversight problem, not an isolated personnel problem.

Where were the automated internal audits? Where was the access review process? Why did it take GitGuardian — a private company — to catch this, when CISA's entire mission is catching exactly this?

CISA's Own Guidance

CISA publishes guidance telling every federal agency, every private company, and every local government how to avoid credential leaks. They put out advisories. They run drills. They lecture the country about basic security hygiene.

Their own contractor stored passwords in a CSV file named after what they were.

If a private company's IT contractor did this, CISA might issue a public advisory about it. There would be regulatory scrutiny. There might be fines.

Instead, the agency that got exposed IS the agency that would normally investigate.

What This Means

AWS GovCloud isn't where the government stores birthday party invitations. It's the cloud infrastructure used for sensitive, often classified or restricted federal operations.

Administrative credentials to three GovCloud servers — plus access to CISA's internal DevSecOps environment — sitting public on GitHub means foreign intelligence services, criminal hackers, and anyone else with a search engine had a window into how America's cyber-defense infrastructure is built and run.

CISA has NOT publicly confirmed whether a full forensic review is underway to determine if anyone malicious accessed those credentials before they were pulled.

The agency responsible for America's cyber defenses got caught with its systems exposed by a private researcher who had to go to the press to get action.

Sources

unknown krebsonsecurity.com CISA Admin Leaked AWS GovCloud Keys on Github – Krebs on Security
unknown malware.news CISA Admin Leaked AWS GovCloud Keys on Github - Malware News