Intelligence
criticalSupply ChainContained

CISA Contractor Exposed AWS GovCloud Credentials and Internal CI/CD Infrastructure via Public GitHub Repository

A CISA contractor maintained a public GitHub repository containing AWS GovCloud credentials for highly privileged accounts and documentation of CISA's internal software build, test, and deployment processes. The exposure represents a significant compromise of US government infrastructure security practices and threat intelligence operations.

S
Sebastion

Affected

AWS GovCloudCISA internal systemsCybersecurity & Infrastructure Security Agency

A contractor supporting the Cybersecurity and Infrastructure Security Agency inadvertently published highly sensitive credentials and operational documentation in a public GitHub repository, creating a direct pathway for adversaries to access privileged AWS GovCloud accounts and internal CISA infrastructure. The repository remained exposed until late May 2026 and contained not just static credentials but comprehensive documentation of CISA's software development lifecycle, deployment pipelines, and testing environments. This is particularly severe because CISA operates at the intersection of US cyber defence and threat intelligence, meaning compromise of their systems could expose intelligence gathering methods, vulnerability assessments, and strategic defensive capabilities.

The technical exposure encompasses multiple attack surfaces: the AWS credentials themselves enable direct access to cloud infrastructure where sensitive workloads likely operate; the CI/CD pipeline documentation reveals build processes, deployment procedures, and configuration management practices that could be exploited or bypassed; internal system documentation may expose network architecture, service dependencies, and authentication mechanisms. Adversaries with access to these materials could pivot from cloud resources into on-premises CISA systems, modify code or configurations to introduce backdoors, or establish persistent access that would be difficult to detect given their knowledge of internal processes.

The incident reflects systemic failures in secrets management and access control. CISA as an organisation should maintain institutional discipline around credential exposure that exceeds even private sector standards, yet a contractor maintained this exposure for an extended period. This suggests inadequate scanning of third-party repositories, weak enforcement of pre-commit secret detection, insufficient contractor onboarding on operational security practices, and possibly poor visibility into what contractor-managed infrastructure exists. The fact that this exposure reached "one of the most egregious government data leaks in recent history" indicates the repository remained accessible and undiscovered for a significant window.

Defenders should assume that any credentials exposed in this repository have been harvested by persistent threat actors, particularly those targeting US government infrastructure. Organisations relying on CISA threat intelligence, vulnerability data, or coordinated defence should re-evaluate their trust assumptions and implement enhanced monitoring for anomalous activity originating from CISA systems. AWS GovCloud administrators must rotate all potentially exposed credentials, audit CloudTrail logs for unauthorised access attempts, and review IAM policies for overly permissive configurations. All internal CISA systems referenced in the exposed documentation should be treated as compromised until proven otherwise.

Broader implications centre on the tension between rapid software development practices and the operational security requirements of critical infrastructure agencies. The presence of comprehensive internal documentation in a contractor repository suggests inadequate data classification and compartmentalisation. CISA's mission is to strengthen US cyber defences, yet this incident demonstrates that mission-critical agencies remain vulnerable to basic operational security failures that private sector organisations with similar threat models have largely addressed. The recovery will likely require extensive forensic analysis, credential rotation across multiple systems, and potentially structural changes to how CISA manages contractor access and secrets.