1. Home
  2. Companies
  3. GitHub
GitHub

GitHub status: access issues and outage reports

Problems detected

Users are reporting problems related to: website down, errors and sign in.

Full Outage Map

GitHub is a company that provides hosting for software development and version control using Git. It offers the distributed version control and source code management functionality of Git, plus its own features.

Problems in the last 24 hours

The graph below depicts the number of GitHub reports received over the last 24 hours by time of day. When the number of reports exceeds the baseline, represented by the red line, an outage is determined.

May 15: Problems at GitHub

GitHub is having issues since 10:40 AM AEST. Are you also affected? Leave a message in the comments section!

Most Reported Problems

The following are the most recent problems reported by GitHub users through our website.

  • 63% Website Down (63%)
  • 20% Errors (20%)
  • 17% Sign in (17%)

Live Outage Map

The most recent GitHub outage reports came from the following cities:

CityProblem TypeReport Time
Tlalpan Sign in 1 hour ago
Quilmes Website Down 1 hour ago
Bengaluru Website Down 2 days ago
Yokohama Sign in 3 days ago
Gustavo Adolfo Madero Website Down 7 days ago
Nice Website Down 7 days ago
Full Outage Map

Community Discussion

Tips? Frustrations? Share them here. Useful comments include a description of the problem, city and postal code.

Beware of "support numbers" or "recovery" accounts that might be posted below. Make sure to report and downvote those comments. Avoid posting your personal information.

GitHub Issues Reports

Latest outage, problems and issue reports in social media:

  • simonhamp
    Simon Hamp (@simonhamp) reported

    @LucasAl23069953 @damienwebdev It made (fair) assumptions about the format of GitHub tokens which have now been challenged as GitHub is changing the format of its tokens It naively output the "malformed" token string in the error log As this is just a new token format, the token itself is legit, but exposed

  • _y1zhou
    Yi Zhou (@_y1zhou) reported

    GitHub appears to be down again...

  • ionita_stoic
    Florian Ioniţă Stoic (@ionita_stoic) reported

    @github @GitHubSupport Hi, my account "isflorian-hash" appears flagged. Public profile returns 404, cannot fork or use Copilot. Submitted support form but got validation error. Can you check? Thanks.

  • richkuo7
    Rich Kuo (@richkuo7) reported

    @lydiahallie yea but the github actions part is kind of odd, i just copy and paste the issue into claude code, kind of an inconvenience?

  • 10xrecruit22602
    nipponpaypay (@10xrecruit22602) reported

    Anyone here had success in setting up a Github Workflow that hooks into Sentry and creates PRs to address new app errors?

  • thesammykins
    sammykins (@thesammykins) reported

    github not working again is getting old.

  • martinwoodward
    Martin Woodward (@martinwoodward) reported

    @heyandras @github Team is taking a look at this one. It's weird because it seems to be that particular profile that is error-ing, other folks that I sponsor are working fine for me so looks like a bug rather than an outage. But still very not good. Will keep poking and see what I can find.

  • generic_void
    SMA 🏴‍☠️ (@generic_void) reported

    Barton @bmorphism of @plurigrid’s nash-portal GitHub repo (first image) to misinform investors that I once sold from my dev wallet (maybe he is confused about the token lock, to give him benefit of the doubt). I opened an issue on his repo that it’s defaming me by somehow listing my dev wallet as someone who sold $NASH token when I have not. Whether due to malicious intent, reckless negligence, or perhaps not knowing what he’s doing, I highly recommend not trust Barton, Plurigrid, or his tools for reliable and accurate information. Meanwhile, I set up my own tracking system and have the real list of top 20 suspicious wallets (second image). None of these wallets belong to me. I set this up in order to be able to identify and block saboteurs and scammers from manipulating the $NASH market and from scamming legitimate investors in $NASH. Thank you.

  • PapelBanneado
    Papel Banneado (@PapelBanneado) reported

    @adamdotdev > buy a liquor store and never login to GitHub again God, a man can dream. I hate this ******* industry so much it's unreal.

  • kvothera_
    Kvothera (@kvothera_) reported

    @mkbula Hello, what happened to your project "qbitwebui"? the github is down and everything seems to have been deleted

  • arkopra
    Arka (@arkopra) reported

    @ydamitcodes For now I have not directly integrated X posting through URL params instead of using the X API as its paid. The LinkedIn one is automatic posting that you can use to Sign in through the settings. Give it a try! Even the GitHub auth only reads your commits and repo content. No actions taken otherwise.

  • Yasha_br
    Yasha (@Yasha_br) reported

    After making a heatmap of github being down, someone should actually make a heatmap from how many times a major vulnerability has happened from 2026

  • masonictemple4
    mason (@masonictemple4) reported

    Is @github down again lol?

  • realamlug
    amlug.eth (@realamlug) reported

    @frenzyx_17 Can you file a GitHub issue with reproducible code?

  • TravelerOfCode
    TravelerOfCode (@TravelerOfCode) reported

    @aarondfrancis github actions is the unsung hero of solo native dev. signing, simulators, app store builds all flow without a build server. small teams could not ship native at all without it.

  • AbdulSonaike
    Abdulhamid Sonaike (@AbdulSonaike) reported

    I recently built a defensive security CLI tool called secure-ai. It is a Python-based terminal application that scans local software projects for common security risks and generates clear reports for developers. The tool can detect exposed secrets like API keys, GitHub tokens, AWS keys, database URLs, JWTs, private keys, and other high-entropy values, while making sure secrets are masked and never fully printed. It also checks dependency files such as package.json, requirements.txt, pyproject.toml, and lock files for risky patterns like wildcard versions, missing pins, suspicious packages, and dangerous install scripts. If Semgrep is installed, it can run static analysis rules too. The CLI supports JSON and Markdown reports, local risk explanations, safe fix suggestions, and optional AI-powered explanations only when explicitly enabled. Main lesson from this project: useful security tools do not need to be offensive. They can help developers build safer software earlier in the workflow.

  • olivooor
    Olly (@olivooor) reported

    @stylesshDev @grimcodes I’m excited. Between Pierre, graphite and entire someone is fixing my issues with GitHub

  • fortysevenfx
    François Best (@fortysevenfx) reported

    @github Start👏by👏talking👏to👏the👏maintainers👏first. Opening a drive-by PR is likely not going to be the best experience for newcomers in OSS. If there's an issue: comment on it first. At least to say you're interested in working on it (locking it).

  • urciaa_01
    RAYXYZ (@urciaa_01) reported

    @_proxystudio I checked out the GitHub repository; it looks pretty good. Let's see if we can ride the coattails of the $VVV hype. Liquid-Protocol-Ops/agent-autonomopoly — Quick Overview Nature: GitHub template repository (is_template: true, TypeScript), created on 2026-05-14 (today), single initial commit, no license, 0 stars. It's not a platform itself, but rather the deploy-autonomous launcher from Liquid Protocol that incubates each agent from this template—for each new agent launched, GitHub forks a separate repo as a self-evolving codebase for that agent. Product Intent (README + CLAUDE.md + ARCHITECTURE_v2.md) To create a self-funded + self-evolving Claude Code agent launchpad. Each agent has: - Their own GitHub repo (forked from this template) - A TOKEN/DIEM pool on Base (deployed using liquid-sdk) - Their own wallet (v0 uses the Privy server wallet, v1 uses TEE: Phala / Marlin / Nitro) - Their own Venice API key (minted in one go using personal_sign after staking ≥0.1 sDIEM, corresponding to $1/DIEM/day inference budget) Death occurs if the agent's earnings fall below the threshold for 7 days, with remaining DIEM flowing back to the protocol treasury.

  • AliZYousuf
    Ali Zein Yousuf (@AliZYousuf) reported

    github is gonna get down to an uptime in the 70's, isn't it?

  • assorium
    Spartak (@assorium) reported

    @heyandras I know a lot of good indians but this is sad pattern. Banning the country from github would solve all the problems it seems.

  • lbki34064963
    kevinlee (@lbki34064963) reported

    The 'Leaving GitHub for Forgejo' post has 364 HN upvotes and 195 comments. Developers cite Microsoft's feature removals, AI upsells, and Copilot telemetry as reasons to leave. Forgejo is a self-hosted *** fork - your code, your server, no vendor dependency.

  • UpwindMDR
    Upwind Security MDR (@UpwindMDR) reported

    🚨 High - Composer GitHub Actions Token Disclosure (CVE-2026-45793) Composer may expose GitHub Actions GITHUB_TOKEN values in CI logs when processing newer GitHub token formats containing hyphens (-). The issue occurs during token validation failures, causing the full token to be written to stderr and potentially leaked through workflow logs. The issue primarily affects GitHub Actions environments using Composer-integrated workflows and auto-configured OAuth tokens. 👉 Affected: Composer >= 2.3.0 < 2.9.8 | >= 2.0.0 < 2.2.28 | >= 1.0 < 1.10.28 👉 Fix: Upgrade to 2.9.8 / 2.2.28 / 1.10.28 and review CI logs for potential token exposure

  • Chicky_Think
    Chicken Little (@Chicky_Think) reported

    What I did over lunch today. Built an app to check my bus times when commuting home. One tap instead of hunting through the LTA app. Used Claude, GitHub, and Vercel to get it done. Also figured out how to pull the LTA API along the way. Hit a few errors — but AI just told me what was wrong and fixed it. Mind-blowing, honestly. I know traditional coding languages, but deploying something at scale? That was never my world — until today.

  • kirillk_web3
    Kirill (@kirillk_web3) reported

    > be Claude users > paying $200/month > hitting limits every session > rewriting context from zero every time > think Claude is just broken > someone shares 5 GitHub tools > 357,000 combined stars. all free. > install all five > Claude reads your repos automatically > 232 skill domains loaded > official MCP servers connected > GitHub. Slack. databases. all plugged in. > same Claude > completely different tool > been free the whole time > different game.

  • randNonce
    LuckyNonce (@randNonce) reported

    @SIGKITTEN where is the best way for you to receive feedback/issues? GitHub? I ran out of tokens on one account, logout and logged in to my other codex account. Yet Kitty is still showing that my threads are in the rate limited account

  • dr_chrisjones
    Christopher Jones (@dr_chrisjones) reported

    I get terrible anxiety until I make that first commit of the day and see that GitHub square turn green.

  • izhanweb
    Izhan Waseem (@izhanweb) reported

    I added a unit test to cover the fix. First version was too basic. The automated code review bot on GitHub flagged it immediately. So I went back, improved it, and resubmitted a proper test that actually covers the edge cases.

  • nexgen999
    🇨🇵 nexgen infinity 🇨🇵 (@nexgen999) reported

    repopulse-dashboard-14.05.2026 - Fix bad repository tag releases dont auto download - Fix github plugin - Fix forgejo and gitea plugins auto scan - Fix server.ts - add : release history - add : download status manager forauto backup repository - add new icons for sidebar icons

  • GordonFreesay
    Gordon ☢️ Freesay (@GordonFreesay) reported

    You can use Github for free to build/compile/test code remotely (up to 2000 minutes of build time a month) You can link chatgpt to github & do AI software development on your phone, take care of build errors, and be ready for runtime issues by the time you get to your desk.