<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Aceiss</title>
    <description>The latest articles on DEV Community by Aceiss (@aceiss).</description>
    <link>https://dev.to/aceiss</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3767642%2F8dd85aad-6a9b-48c0-a151-bb7e467d7ca2.png</url>
      <title>DEV Community: Aceiss</title>
      <link>https://dev.to/aceiss</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aceiss"/>
    <language>en</language>
    <item>
      <title>AI-driven phishing is turning GitHub into a bigger attack surface than most teams realize</title>
      <dc:creator>Aceiss</dc:creator>
      <pubDate>Tue, 03 Mar 2026 20:49:23 +0000</pubDate>
      <link>https://dev.to/aceiss/ai-driven-phishing-is-turning-github-into-a-bigger-attack-surface-than-most-teams-realize-4ep9</link>
      <guid>https://dev.to/aceiss/ai-driven-phishing-is-turning-github-into-a-bigger-attack-surface-than-most-teams-realize-4ep9</guid>
      <description>&lt;p&gt;AI has made phishing attacks dramatically more convincing — and far more scalable.&lt;/p&gt;

&lt;p&gt;Instead of clumsy emails, we’re seeing highly contextual impersonation that targets developers directly. And once identity is compromised, GitHub becomes a high-leverage entry point.&lt;/p&gt;

&lt;p&gt;Why GitHub?&lt;/p&gt;

&lt;p&gt;Because it sits at the center of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Source code&lt;/li&gt;
&lt;li&gt;CI/CD pipelines&lt;/li&gt;
&lt;li&gt;Deployment workflows&lt;/li&gt;
&lt;li&gt;Secrets and credentials&lt;/li&gt;
&lt;li&gt;Third-party integrations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A compromised GitHub identity isn’t just an account issue. It can turn into:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Supply chain risk&lt;/strong&gt; – malicious commits, dependency poisoning, or backdoors that get distributed downstream (SolarWinds is the obvious large-scale example).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operational disruption&lt;/strong&gt; – deleted repos, forced pushes, permission changes, or locked-out teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IP theft / espionage&lt;/strong&gt; – especially in industries like automotive, defense, or AI infrastructure.&lt;/p&gt;

&lt;p&gt;What’s interesting is that most teams can see:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles&lt;/li&gt;
&lt;li&gt;Repo permissions&lt;/li&gt;
&lt;li&gt;Org membership&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But they often can’t easily see:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;When access was actually last used&lt;/li&gt;
&lt;li&gt;Dormant or overprivileged tokens&lt;/li&gt;
&lt;li&gt;Installed bots and third-party apps across the org&lt;/li&gt;
&lt;li&gt;Effective access patterns across all repos&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With phishing increasingly targeting identities instead of infrastructure, visibility into actual access usage feels more important than ever.&lt;/p&gt;

&lt;p&gt;Curious how others here are approaching GitHub identity risk:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Are you auditing PAT usage regularly?&lt;/li&gt;
&lt;li&gt;How are you monitoring bot access?&lt;/li&gt;
&lt;li&gt;Do you track unused or stale privileges across orgs?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;(Disclosure: I’m involved with a company working on this problem — happy to share details if helpful, but mainly interested in how others are thinking about the issue. Contact: &lt;a href="mailto:support@aceiss.com"&gt;support@aceiss.com&lt;/a&gt;)&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>monitoring</category>
    </item>
  </channel>
</rss>
