Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Create Fast Growth Companies With Growth Loops

    October 20, 2025

    Ninja Prestige DualBrew System review: espresso and drip coffee don’t get easier than this

    October 19, 2025

    Bluesky adds private bookmarks | TechCrunch

    October 19, 2025
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»GitHub Copilot Chat Flaw Leaked Data From Private Repositories
    GitHub Copilot Chat Flaw Leaked Data From Private Repositories
    Cybersecurity

    GitHub Copilot Chat Flaw Leaked Data From Private Repositories

    The Tech GuyBy The Tech GuyOctober 9, 2025No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    Legit Security has detailed a vulnerability in the GitHub Copilot Chat AI assistant that led to sensitive data leakage and full control over Copilot’s responses.

    Advertisement

    Combining a Content Security Policy (CSP) bypass with remote prompt injection, Legit Security’s Omer Mayraz was able to leak AWS keys and zero-day bugs from private repositories, and influence the responses Copilot provided to other users.

    Copilot Chat is designed to provide code explanations and suggestions, and allows users to hide content from the rendered Markdown, using HTML comments.

    A hidden comment would still trigger the usual pull request notification to the repository owner, but without displaying the content of the comment. However, the prompt is injected into other users’ context as well.

    The hidden comments feature, Mayraz explains, allows a user to influence Copilot into displaying code suggestions to other users, including malicious packages.

    Mayraz also discovered that he could craft prompts containing instructions to access users’ private repositories, encode their content, and append it to a URL.

    “Then, when the user clicks the URL, the data is exfiltrated back to us,” he notes.

    However, GitHub’s restrictive CSP blocks the fetching of images and other content from domains not owned by the platform, thus preventing data leakage by injecting an HTML tag into the victim’s chat.

    Advertisement. Scroll to continue reading.

    When external images are included in a README or Markdown file, GitHub parses them to identify the URLs, and generates an anonymous URL proxy for each file using the open source project Camo.

    The external URL is rewritten to a Camo proxy URL and, when the browser requests the image, the Camo proxy checks the URL signature and fetches the external image from the original location only if the URL was signed by GitHub.

    This prevents the exfiltration of data using arbitrary URLs, ensures security by using a controlled proxy to fetch images, and does not expose the image URL when it is displayed in the README.

    “Every tag we inject into the victim’s chat must include a valid Camo URL signature that was pre-generated. Otherwise, GitHub’s reverse proxy won’t fetch the content,” Mayraz notes.

    To bypass the protection, the researcher created a dictionary of all letters and symbols in the alphabet, pre-generated corresponding Camo URLs for each of them, and embedded the dictionary into the injected prompt.

    He created a web server that responded with a 1×1 transparent pixel to each request, created a Camo URL dictionary of all the letters and symbols he could use to leak sensitive content from repositories, and then built the prompt to trigger the vulnerability.

    Mayraz has published proof-of-concept (PoC) videos demonstrating how the attack could be used to exfiltrate zero-days and AWS keys from private repositories.

    On August 14, GitHub notified the researcher that the issue had been addressed by disallowing the use of Camo to leak sensitive user information.

    Related: Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation

    Related: Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk

    Related: GitHub Boosting Security in Response to NPM Supply Chain Attacks

    Related: Code Execution Vulnerability Patched in GitHub Enterprise Server

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

    October 12, 2025

    Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date

    October 12, 2025

    ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

    October 11, 2025

    Juniper Networks Patches Critical Junos Space Vulnerabilities

    October 11, 2025

    RondoDox Botnet Takes ‘Exploit Shotgun’ Approach

    October 11, 2025

    In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

    October 10, 2025
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20257 Views

    Huawei Watch GT 6 Pro review

    October 12, 20256 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Create Fast Growth Companies With Growth Loops

    October 20, 2025

    Ninja Prestige DualBrew System review: espresso and drip coffee don’t get easier than this

    October 19, 2025

    Bluesky adds private bookmarks | TechCrunch

    October 19, 2025
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2025 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.