CISA contractor apparently leaked 'highly sensitive' government AWS keys on Github
"One of the most egregious government data leaks in recent history"
- A public GitHub repository called “Private‑CISA” exposed highly sensitive internal credentials and systems used by the US Cybersecurity and Infrastructure Security Agency
- Security researchers confirmed the authenticity of the leak, describing it as one of the worst government data exposures they had ever seen
- The repository, maintained by contractor Nightwing, was eventually locked down, with CISA pledging safeguards to prevent future incidents
Researchers have revealed details on what they called, “one of the most egregious government data leaks in recent history” involving some potentially incredibly sensitive US government information.
Security researcher Guillaume Valadon reached out to KrebsOnSecurity to help contact a person in charge of a public GitHub repository.
This person, who was not responding to messages, was operating a GitHub repository called “Private-CISA” which contained, among other things:
- AWS GovCloud administrative credentials for three accounts
- AWS access keys
- AWS tokens (including “importantAWStokens” file)
- Plaintext usernames and passwords for internal CISA systems
- “AWS-Workspace-Firefox-Passwords.csv” containing login credentials
- Credentials for internal system “LZ-DSO” (Landing Zone DevSecOps)
- Internal CISA/DHS system authentication credentials
- Credentials for internal Artifactory (software repository)
- SSH keys exposed in a public repository
"The worst leak in my career"
Valadon said the archive detailed how CISA builds and deploys software internally and that, in general, it is “the worst leak that I’ve witnessed in my career.”
In a letter shared with KrebsOnSecurity, Valadon said he first thought the entire database was fake, given the sensitivity of the files found inside. “It is obviously an individual’s mistake, but I believe that it might reveal internal practices,” he said.
Multiple security researchers confirmed the authenticity of the leak and said that at least some of the credentials found inside worked. They managed to get the repository locked down after getting in touch with the US Cybersecurity and Infrastructure Security Agency (CISA), who confirmed it was looking into the matter:
“Currently, there is no indication that any sensitive data was compromised as a result of this incident,” the CISA spokesperson allegedly wrote. “While we hold our team members to the highest standards of integrity and operational awareness, we are working to ensure additional safeguards are implemented to prevent future occurrences.”
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The researchers later established that the repository was maintained by a government contractor called Nightwing, which declined to comment and directed all inquiries to CISA. It is unknown for how long the repository remained open, but it was created in mid-November 2025, and chances are it was unlocked since inception.

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mobile:
McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.