CISA Admin Leaked AWS GovCloud Keys on GitHub

· cloud devtools history · Source ↗

TLDR

  • A Nightwing contractor’s public “Private-CISA” GitHub repo exposed AWS GovCloud admin keys, plaintext passwords, and CISA DevSecOps build secrets from Nov 2025 to May 2026.

Key Takeaways

  • Files included importantAWStokens (admin creds to 3 AWS GovCloud accounts) and AWS-Workspace-Firefox-Passwords.csv (dozens of plaintext CISA system passwords).
  • The contractor manually disabled GitHub’s built-in secret scanning, then stored backups, SSH keys, and CSV passwords in a public repo apparently used to sync between work and home machines.
  • Artifactory credentials were also exposed, creating a supply-chain backdoor risk: attackers could inject malicious packages into every CISA build pipeline.
  • AWS keys remained valid for 48 hours after CISA was notified; many passwords followed the pattern platformname+year, weak even if never externally exposed.
  • CISA is operating at roughly two-thirds staffing after Trump-era cuts, and the contractor Nightwing declined all comment.

Hacker News Comment Review

  • Commenters flagged a broader, underappreciated risk: LLM coding assistants routinely read .env files and secrets on disk without triggering secret-scanning alerts, silently shipping them to model providers.
  • There is strong consensus that static long-lived AWS credentials are the root structural problem; hyperscaler OIDC/role-based auth exists but adoption gaps remain, with specific platforms like Railway cited as still lacking AWS role/OIDC support.
  • Several commenters questioned whether the incident was pure incompetence or deliberate sabotage, pointing to the November 2025 timing and the DHS acting CSO controversy from the same period.

Notable Comments

  • @dcrazy: Notes the irony that federal CAC smartcard auth has existed for decades yet government cloud infrastructure still runs on passwords.
  • @debarshri: Points out the same CISA team also uploaded sensitive documents to ChatGPT, suggesting a pattern beyond this single incident.

Original | Discuss on HN