GitHub CTO Apologizes for Reliability Issues and Security Breach

GitHub's CTO Vladimir Fedorov apologized for reliability this morning. Hours later, GitHub disclosed that a single git push could hijack its servers. Two posts. Same morning. Same platform. April 23: a merge queue regression silently reverted 2,092 pull requests across 658 repositories. Squash commits were generated from the wrong base. Merged code appeared to have never existed. April 27: search across PRs and issues fell over, likely under a botnet load. April 28: Wiz researchers showed that a crafted git push could run code on GitHub's servers, outside any sandbox. CVE-2026-3854. CVSS 8.7. Cross-tenant access to millions of repos. github(.com) was patched in 75 minutes. 88% of GitHub Enterprise Server instances are still vulnerable. Git is the boring layer. It is supposed to be deterministic. What you push is what's stored. What's merged stays merged. A push is a push. Three breaches of that contract in five days, on a platform that has not had a CEO in nearly a year. Vlad Fedorov ends his availability post with: "availability first, then capacity, then new features." That order is itself the news. Would appreciate a follow if you want to read more interesting tech stories coming out of this AI era. --- #GitHub #Security #Engineering #Infrastructure #DevOps

  • diagram, text

This wasn't just about the security flaw, but about GitHub's reliability. Worth a read here - https://monkfrom.earth/blogs/github-rce-cve-2026-3854

Like
Reply

Man yesterday I was so frustrated because there servers were down. I wasn't aware about that and put of frustration I took many wrong steps in my oss and the project is so cooked 😭. Anyways I'll revert it as soon as GitHub fixes whatever they are facing.

plz don't lose my code you are my backups

See more comments

To view or add a comment, sign in

Explore content categories