Get all your news in one place.
100's of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

CISA contractor apparently leaked 'highly sensitive' government AWS keys on Github

A composite image featuring a stylized digital military base schematic partially covered by a translucent "Data Leak" warning graphic in red and white.
  • A public GitHub repository called “Private‑CISA” exposed highly sensitive internal credentials and systems used by the US Cybersecurity and Infrastructure Security Agency
  • Security researchers confirmed the authenticity of the leak, describing it as one of the worst government data exposures they had ever seen
  • The repository, maintained by contractor Nightwing, was eventually locked down, with CISA pledging safeguards to prevent future incidents

Researchers have revealed details on what they called, “one of the most egregious government data leaks in recent history” involving some potentially incredibly sensitive US government information.

Security researcher Guillaume Valadon reached out to KrebsOnSecurity to help contact a person in charge of a public GitHub repository.

This person, who was not responding to messages, was operating a GitHub repository called “Private-CISA” which contained, among other things:

  • AWS GovCloud administrative credentials for three accounts
  • AWS access keys
  • AWS tokens (including “importantAWStokens” file)
  • Plaintext usernames and passwords for internal CISA systems
  • “AWS-Workspace-Firefox-Passwords.csv” containing login credentials
  • Credentials for internal system “LZ-DSO” (Landing Zone DevSecOps)
  • Internal CISA/DHS system authentication credentials
  • Credentials for internal Artifactory (software repository)
  • SSH keys exposed in a public repository

"The worst leak in my career"

Valadon said the archive detailed how CISA builds and deploys software internally and that, in general, it is “the worst leak that I’ve witnessed in my career.”

In a letter shared with KrebsOnSecurity, Valadon said he first thought the entire database was fake, given the sensitivity of the files found inside. “It is obviously an individual’s mistake, but I believe that it might reveal internal practices,” he said.

Multiple security researchers confirmed the authenticity of the leak and said that at least some of the credentials found inside worked. They managed to get the repository locked down after getting in touch with the US Cybersecurity and Infrastructure Security Agency (CISA), who confirmed it was looking into the matter:

“Currently, there is no indication that any sensitive data was compromised as a result of this incident,” the CISA spokesperson allegedly wrote. “While we hold our team members to the highest standards of integrity and operational awareness, we are working to ensure additional safeguards are implemented to prevent future occurrences.”

The researchers later established that the repository was maintained by a government contractor called Nightwing, which declined to comment and directed all inquiries to CISA. It is unknown for how long the repository remained open, but it was created in mid-November 2025, and chances are it was unlocked since inception.

Sign up to read this article
Read news from 100's of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.