Security gap: Activity tab retains history after force push #188583
Replies: 2 comments
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
This is a legitimate and underappreciated security concern. I want to add some technical context for anyone reading this. The core problem: Even after a force push, Git objects are not immediately garbage-collected on GitHub's servers. This means:
What this means in practice:
What affected users should do right now:
+1 on the suggested fixes. At minimum, GitHub should:
This isn't just a UI issue — it's a gap in the security remediation workflow. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
Related: https://github.com/orgs/community/discussions/53140#discussioncomment-6052248 (closed without resolution)
When a developer accidentally commits a secret (API key, token, etc.), or doesn't want anyone to see older commits, and force-pushes a rewritten history to remediate it, the
/activitytab still publicly shows the old commit SHAs(3 dots > Compare changes)and branch events, visible to anyone, including unauthenticated users.This creates a silent false sense of security: the developer thinks the leak is fixed, but the activity log keeps a permanent breadcrumb trail pointing to the exposed commits.
Suggested fixes
This is a common real-world scenario and the current behavior directly undermines GitHub's own recommended remediation steps for secret leakage.
Beta Was this translation helpful? Give feedback.
All reactions