← All Posts

There you have it! This is a HUGE ONE. A single git push just gave researchers full remote code e…

April 29, 2026 · 0 likes · 0 comments
Insights
There you have it! This is a HUGE ONE. A single git push just gave researchers full remote code execution on GitHub's internal infrastructure. CVE-2026-3854. CVSS 8.7.

Wiz found it. One crafted push option. Semicolon injection. Sandbox bypass. Unsandboxed RCE on GitHub.com production servers with cross-tenant access to millions of private repositories. Read that again.

GitHub Enterprise Server? Full server compromise. 88% of instances still vulnerable at disclosure.

GitHub patched in 75 minutes on March 4. Then sat on it for nearly two months before telling anyone. No independent audit. Just their own telemetry saying "no evidence of exploitation."

Microsoft owns GitHub. Every Fortune 500 company stores proprietary source code there. How does Microsoft prove our IP was not accessed? What is their legal liability for that two-month silence and potential exploitation? What are the financial consequences for companies whose source code may have been exposed?

Self-certification is worthless. Independent audit or it did not happen. And IP theft is not recoverable. You cannot un-steal source code. Once it is out, it is out. Forever.

Time to wake up!

Thoughts?
View original on LinkedIn →