Github Copilot committed and exposed my .env secrets #188340
Replies: 1 comment
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Copilot Feature Area
Copilot Agent Mode
Body
I have been using the Agent UI on github's website and mobile app for my open source projects quite a bit and today completely unrelated to anything in my prompt it committed the values in my secrets and exposed my api tokens (or guessed at some random ones?) this is REALLY annoying after having recently cleaned up compromised api keys.
Seems like a huge flaw since I can't stop copilot from pushing this commit to my repo
https://github.com/ProLoser/funcheapmap/pull/58/changes#diff-0fda11ec8dab64bfd2ce50204c9ba50abd09ce5764739cac927b95bc431cf96bL7
Beta Was this translation helpful? Give feedback.
All reactions