BotBeat
...
← Back

> ▌

GitHubGitHub
POLICY & REGULATIONGitHub2026-04-14

GitHub Notifies Users of Webhook Secret Exposure Bug; Urges Secret Rotation

Key Takeaways

  • ▸Webhook secrets were exposed in HTTP headers for deliveries between September 11, 2025, and December 10, 2025, with a brief recurrence on January 5, 2026
  • ▸GitHub advises users to rotate their webhook secrets immediately to prevent potential forgery of webhook payloads
  • ▸The bug was limited to a subset of webhook deliveries using a feature-flagged new platform version and has been fixed as of January 26, 2026
Source:
Hacker Newshttps://news.ycombinator.com/item?id=47767928↗

Summary

GitHub disclosed a security incident affecting webhook users, revealing that webhook secrets were inadvertently exposed in HTTP headers during webhook deliveries between September 2025 and January 2026. The bug, which affected a subset of webhook deliveries using a new platform version, allowed receiving endpoints to access webhook secrets in base64-encoded format through the X-Github-Encoded-Secret HTTP header. While GitHub states there is no evidence of actual secret interception and that the bug was fixed on January 26, 2026, the company has notified affected users to rotate their webhook secrets as a precautionary measure.

The exposure poses a potential security risk because webhook secrets are used to verify the authenticity of deliveries and compute HMAC signatures. If compromised, an attacker could forge webhook payloads to appear as if they originated from GitHub. GitHub emphasized that the webhook payload content itself was not additionally affected, no other credentials or tokens were compromised, and GitHub itself did not experience a breach. The company framed the disclosure as part of its commitment to user privacy and transparency.

  • While TLS encryption protected secrets in transit and GitHub has no evidence of actual interception, affected systems that logged HTTP headers may contain webhook secrets in their logs

Editorial Opinion

This incident underscores the importance of secure credential handling in platform infrastructure, particularly when introducing new versions of critical systems like webhook delivery. GitHub's transparent communication and no-evidence-of-compromise assessment are commendable, but the proactive approach of notifying users to rotate secrets—even without confirmed compromise—demonstrates appropriate security hygiene. Organizations should use this as a reminder to audit their webhook implementations and review access logs from the affected period for potential exposure.

CybersecurityPrivacy & Data

More from GitHub

GitHubGitHub
PRODUCT LAUNCH

GitHub Launches Season 4 of Secure Code Game Focused on AI Agent Security

2026-04-15
GitHubGitHub
UPDATE

GitHub Copilot Customers Revolt Over Aggressive Rate Limits Following Token Counting Bug Fix

2026-04-15
GitHubGitHub
UPDATE

GitHub Pauses Copilot Pro Free Trials Amid Abuse Investigation

2026-04-15

Comments

Suggested

AnthropicAnthropic
RESEARCH

AI Safety Convergence: Three Major Players Deploy Agent Governance Systems Within Weeks

2026-04-17
AnthropicAnthropic
PRODUCT LAUNCH

Finance Leaders Sound Alarm as Anthropic's Claude Mythos Expands to UK Banks

2026-04-17
AnthropicAnthropic
UPDATE

Claude 4.7's Autonomous Capabilities Create Security Risks, New OS-Level Protection Announced

2026-04-17
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us