Megalodon GitHub Attack Targets 5,561 Repos
On May 22, 2026, a large-scale cyberattack dubbed “Megalodon” targeted GitHub repositories, injecting malicious CI/CD workflows into 5,561 public and private repos. The attack exploited automated workflows to spread malware, raising concerns about supply chain security in open-source software development.
Key Details
The attackers leveraged GitHub Actions, a CI/CD tool, to introduce malicious scripts into repositories. These scripts were designed to exfiltrate sensitive data and deploy further payloads. GitHub has confirmed the attack and is actively investigating the extent of the breach. The company is also working to notify affected repository owners and mitigate the spread of malicious code.
Context and Impact
This incident follows a series of high-profile security breaches involving GitHub, including a recent case where an employeeβs compromised device led to the exfiltration of over 3,800 repositories. The Megalodon attack highlights the vulnerabilities in CI/CD pipelines, which are increasingly targeted by malicious actors due to their automation capabilities and widespread use in software development.
GitHub has advised developers to review their workflows and ensure they are not executing untrusted code. The company is also enhancing its security measures to detect and prevent similar attacks in the future.
Whatβs Next
GitHub is expected to release a detailed report on the attack in the coming weeks, including recommendations for developers to secure their CI/CD pipelines. Meanwhile, affected users are urged to audit their repositories and remove any suspicious workflows.
For more information on GitHub security incidents, read about the internal repository breach caused by a malicious VS Code extension.