Story Details

  • GitHub MCP exploited: Accessing private repositories via MCP

    Posted: 2025-05-26 13:46:25

    A vulnerability in GitHub's Memcached Cloud Provider (MCP) allowed unauthorized access to private repositories. Invariant Labs discovered that GitHub used MCP to cache private repository metadata, including the repository name, visibility, and collaborators. By manipulating specific MCP requests, they were able to retrieve this cached data for arbitrary private repositories, effectively bypassing access controls. While the vulnerability did not allow direct access to the repository content itself, the exposed metadata could still reveal sensitive information. GitHub promptly patched the vulnerability after being notified by Invariant Labs.

    Summary of Comments ( 268 )
    https://news.ycombinator.com/item?id=44097390

    Hacker News users discuss the implications of the MCP vulnerability, with some highlighting the severity of accessing private repositories and the potential for malicious actors to exploit this weakness for data breaches or sabotage. Others question the responsibility of developers who used MCP and the level of trust placed in third-party tools. The impracticality of manually verifying every commit's origin is also brought up, emphasizing the need for robust security measures within GitHub and similar platforms. Several commenters express surprise at the vulnerability existing for so long undetected and speculate on the reasons, including the complexity of modern software development and the potential for overlooking seemingly minor features like MCP. The lack of attention given to MCP likely contributed to the delayed discovery. Some also discuss the potential legal ramifications for both GitHub and developers affected by the vulnerability.