GitHub Outage Map
The map below depicts the most recent cities worldwide where GitHub users have reported problems and outages. If you are having an issue with GitHub, make sure to submit a report below
The heatmap above shows where the most recent user-submitted and social media reports are geographically clustered. The density of these reports is depicted by the color scale as shown below.
GitHub users affected:
GitHub is a company that provides hosting for software development and version control using Git. It offers the distributed version control and source code management functionality of Git, plus its own features.
Most Affected Locations
Outage reports and issues in the past 15 days originated from:
| Location | Reports |
|---|---|
| Itapema, SC | 1 |
| Cleveland, TN | 1 |
| Tlalpan, CDMX | 1 |
| Quilmes, BA | 1 |
| Bengaluru, KA | 1 |
| Yokohama, Kanagawa | 1 |
| Gustavo Adolfo Madero, CDMX | 1 |
| Nice, Provence-Alpes-Côte d'Azur | 1 |
| Brasília, DF | 1 |
| Montataire, Hauts-de-France | 3 |
| Colima, COL | 1 |
| Poblete, Castille-La Mancha | 1 |
| Ronda, Andalusia | 1 |
| Hernani, Basque Country | 1 |
| Tortosa, Catalonia | 1 |
| Culiacán, SIN | 1 |
| Haarlem, nh | 1 |
| Villemomble, Île-de-France | 1 |
| Bordeaux, Nouvelle-Aquitaine | 1 |
| Ingolstadt, Bavaria | 1 |
| Paris, Île-de-France | 1 |
| Berlin, Berlin | 1 |
| Dortmund, NRW | 1 |
| Davenport, IA | 1 |
| St Helens, England | 1 |
| Nové Strašecí, Central Bohemia | 1 |
| West Lake Sammamish, WA | 3 |
| Parkersburg, WV | 1 |
| Perpignan, Occitanie | 1 |
| Piura, Piura | 1 |
Community Discussion
Tips? Frustrations? Share them here. Useful comments include a description of the problem, city and postal code.
Beware of "support numbers" or "recovery" accounts that might be posted below. Make sure to report and downvote those comments. Avoid posting your personal information.
GitHub Issues Reports
Latest outage, problems and issue reports in social media:
-
blockzilla (@BlockzillaTech) reportedattack vector was simple: employee installed a malicious extension. once inside, they pulled internal source and org files. Github says customer repos weren’t touched (but how many have been done on the same exploit), but that’s not the real issue. the real issue is whatever secrets, keys, and tokens were sitting in those internal repos, im sure its rough day in the trenches rotating everything...
-
Tamim (@tamimbuilds) reported@yadavji_codes GitHub copilot be like I will fix it
-
🦅 (@EagleEyesCrypto) reportedif you believe agents will install and run code on their own, you need a package layer that isn’t built for human devs. @Nipmod is exactly that. npm for agents, sitting on top of gitlawb (the github for agents). verified packages, DID-signed ownership, MCP server live. real product, not a deck. 28 verified packages, 388 claimable drafts, working CLI + MCP server for codex / claude code / opencode. gitlawb = github for agents nipmod = npm for agents
-
Luis Parra (@LuisParra1019) reported@reach_vb I’ve been doing: “/goal achieve X and open a PR until Codex Review in GitHub does not find major issues”
-
Yash Patel (@yash_patel2003) reported@sandislonjsak Why ? What's the issue with Github?
-
tcpdump (@dump_tcp) reported@IntCyberDigest should we take the forum down where there advertising it at? #github #teampcp #hacked
-
intermind (@perasperagi) reportedthe feeling of customization (managing agents, mcp servers) and transparency is also better in github copilot, though perhaps still a little slow on the thinking side but that could be a base plan/model feature
-
Patrik (@PatrikTheDev) reported@theo That would maybe force them to acknowledge the existence of a problem…wait ofc it wouldn’t, they’re GitHub
-
21st Century Digital Boy (@TonhaoSemAcento) reportedI bet that hackers did this to fix github downtime
-
m-ret (@mretsal) reportedHow are we safe when our package manager is compromised and github is down most of the time and HACKED?
-
Crash Loop BackOff (@MLOpsCamp) reportedGithub continues to flail. At least they're copping to it, though it's not clear what steps they are taking at a more systemic level, given the plague of recent issues.
-
ꂦꋪꀤꌗꂦꈤ (@orisonhere) reported@github imagine they tried to actually fix your platform
-
VaultKeepR - Decentralized Password Manager (@vaultkeepr_xyz) reported16 billion passwords. Two for every human on Earth, scraped from infostealer malware and dumped across thirty databases. Apple, Google, Facebook, GitHub, Telegram — every platform you use has credentials in that dataset. The real story: every tool you were told to trust has already failed you. The cybersecurity industry sold us a simple deal: hand your secrets to a centralized password manager, trust its zero-knowledge encryption, and sleep soundly. LastPass was the poster child. Its vaults were encrypted, the company said — even if breached, your data was safe. Then the FBI and Secret Service confirmed the 2022 LastPass breach directly enabled over $150 million in crypto heists, including the theft from Ripple co-founder Chris Larsen. The attacker captured a master password via a keylogger from a cracked streaming app, bypassed MFA by stealing a trusted device cookie, and downloaded encrypted vaults. Those vaults were cracked offline — especially customers who stored crypto seed phrases in "Secure Notes." In December 2025, the UK's ICO fined LastPass £1.2 million. "LastPass customers had a right to expect the personal information they entrusted to the company would be kept safe and secure." They were wrong. The 16 billion leak amplifies this lesson. Over 85% came from infostealers like RedLine and Vidar, which target browser autofill and password manager databases. The threat is real, happening at scale every day. And the password managers we rely on are not defending us — they're becoming honeypots. Centralized servers, company-controlled encryption keys, employee laptops with VPN access — every link in that chain is a point of trust, and trust is exactly what attackers exploit. Zero-knowledge is no longer enough. It promises the company can't read your data, but doesn't protect you from security failures, insider threats, supply chain attacks, or the fact that your master password is a single point of failure malware can capture. The only way to truly protect credentials is to eliminate trust entirely — to build a system where you don't have to trust a company's servers, employees, or encryption claims because none of it exists. That's the philosophy behind VaultKeepR. No central server, account signup, email, phone number, or master password to steal. Authentication happens on your device via biometrics (fingerprint, face) or your own crypto wallet. Everything is encrypted on-device with Argon2id and XChaCha20-Poly1305 before it touches storage. Backups are distributed across IPFS, where no single node can read your vault. A Shamir 3-of-5 fragmented recovery key means even you don't hold the full key in one place. No employee laptop can be compromised to reach your data because there is no data on our servers. The 16 billion leak and LastPass catastrophe aren't isolated — they're symptoms of a broken architecture that demands trust. Trust in employees, in encryption, in no keylogger on your machine when you type your master password. Too many moving parts in a world where infostealers stole 2.1 billion credentials in 2024 alone. The internet witnessed the largest password leak in history. The FBI confirmed a "zero-knowledge" password manager enabled hundreds of millions in theft. A regulator fined them for negligence. If that doesn't convince you the old model is broken, ask yourself: who are you trusting with your digital life? The answer should be no one.
-
TheOpeningMove (@TheOpeningMove1) reportednot the scary part: the repo count. the scary part is the path in. a code editor extension hit an employee machine, then GitHub had to rotate critical secrets. that is not a hosting problem. that is a developer endpoint problem.
-
Fabio (@Zero2HeroZombie) reportedGitHub was compromised via a poisoned VS Code extension on an employee device. Internal repositories were exfiltrated: attacker’s claim of ~3,800 repos is consistent with their investigation so far. Cybersecurity is a huge issue. This is why I am tracking $ICP on a daily basis. It offers a higher standard of security.