Taylor Parsons
by Taylor Parsons

A wake-up call for identity security in devops

feature
Aug 26, 20257 mins
Application SecurityAuthenticationData and Information Security

The GitHub OAuth attack exposed a security blind spot in the ever-growing web of permissions spanning developers, service accounts, and third-party OAuth apps. Hereโ€™s how to address it.

Flashlight, illumination, investigation, discovery
Credit: Realstock/Shutterstock

In early 2025, GitHub lit up with confusion and more than a little panic. Thousands of developers found suspicious issues posted in their public repositories, flagged with a GitHub-style โ€œSecurity Alert: Unusual Access Attemptโ€ warning. The problem? It wasnโ€™t GitHub. It was an attacker masquerading as GitHub support, luring developers into authorizing a malicious OAuth app (gitsecurityapp) under the guise of incident response.

No zero-day. No credential theft. Just OAuth abuse, at scale.

This wasnโ€™t the first OAuth-based exploit to hit the software supply chain, but it might be the loudest. The attackers knew the ecosystem. Because developers trust GitHubโ€™s UI, they often skip reading OAuth scopes, and few organizations have real guardrails around what third-party apps can do once connected.

You can read the full technical breakdownย on the Veza blog. Iโ€™ll cover the high points here.

The real problem: visibility, not vulnerability

OAuth is baked into how developers work. GitHub Actions, CI/CD pipelines, repo syncs, cloud IDEsโ€”all of it runs on OAuth tokens and API scopes. But unlikeย SAML (Security Assertions Markup Language) or OIDC (OpenID Connect) flows, which are tied to policy, logging, and governance, OAuth apps often fly under the radar. Thatโ€™s exactly what the attackers counted on.

Once users clicked โ€œAuthorize,โ€ the malicious app inherited repo-level permissions, including access to:

  • Source code (obviously)
  • GitHub Actions secrets and automation tokens
  • Linked infrastructure provisioning (Terraform, Pulumi, etc.)
  • Hard-coded API keys and credentials
  • Read/write org-level metadata in some cases

From there, attackers could pivot laterally across repos, leak code, plant backdoors, and poison builds. This wasnโ€™t just a repo hygiene issue. It was an identity perimeter failure.

The identity security blind spot in devops

Traditional identity and access management (IAM) tools werenโ€™t designed to handle this. Cloud security posture management (CSPM) platforms donโ€™t watch GitHub OAuth. CI/CD security tools focus on build-time issues, not identity relationships. Single sign-on providers might enforce login policy, but OAuth apps are often granted access after authentication, outside of those controls.

Thatโ€™s the gap attackers walked right through.

The GitHub incident exposed what security teams already suspectโ€”that devops is running headlong into an identity sprawl problem. Identities (human and non-human) are multiplying, permissions are stacking up, and third-party apps are the new soft underbelly.

This is whereย identity security posture management (ISPM)ย steps in. ISPM takes the principles of cloud security posture management (CSPM)โ€”continuous monitoring, posture scoring, risk-based controlsโ€”and applies them to identity. It doesnโ€™t stop at who can log in; it extends intoย who has access,ย why they have it,ย what they can do, andย how that access is granted, including via OAuth.

Visibility through identity security posture management

Modern identity security platforms are stepping in to close this gap. The leading solutions give you deep visibility into the web of permissions spanning developers, service accounts, and third-party OAuth apps. Itโ€™s no longer enough to know that a token exists. Teams need full context: who issued the token, what scopes it has, what systems it touches, and how those privileges compare across environments.

With the right platform in place, security teams can:

  • Inventory and monitor all authorized OAuth applications, complete with scopes and usage context.
  • Detect permission drift between human and non-human identities, so that temporary access doesnโ€™t turn into persistent exposure.
  • Enforce least privilege principles across developer tools and CI/CD pipelines, without blocking velocity.
  • Create reusable access guardrails (sometimes calledย access profiles) to baseline what โ€œgoodโ€ looks like in production.
  • Continuously monitor identity posture, surfacing risky over-permissioned paths or broken-glass misconfigurations before adversaries exploit them.

This is the heart of what analyst firms like Gartner now classify as identity security posture management (ISPM): proactively securing the perimeter where identity meets access, especially in developer environments, where the stakes (and the sprawl) are highest.

GitHub OAuth governance: A critical ISPM use case

GitHub has evolved far beyond version control. Itโ€™s now one of the most identity-dense platforms in the modern enterprise. And with that growth comes risk. OAuth apps, in particular, are a hidden minefieldโ€”often overprivileged, loosely monitored, and ripe for abuse.

From an ISPM lens, this isnโ€™t just a configuration hygiene issue. Itโ€™s a real posture control gap. Modern identity security platforms are starting to close that gap by continuously mapping the relationship between GitHub identities (users, service accounts, teams) and the OAuth scopes theyโ€™ve authorized. The goal? Uncovering posture drift before it turns into breach material.

Key capabilities in these platforms typically include:

  • Real-time mappingย of authorized OAuth apps, scopes, and target repos.
  • Drift detection, such as apps granted write or admin scopes that exceed baseline policy.
  • Attribution clarity, answering questions like who approved what, when, and why.
  • Policy enforcementย to flag or block overly permissive apps based on least-privilege guardrails.

Rather than relying solely on periodic audits or manual repo reviews, these solutions integrate posture assessments directly into the devsecops life cycle, surfacing issues early, enforcing policy continuously, and keeping developer velocity high without sacrificing control.

GitHub OAuth governance has become a front-line ISPM use case. If youโ€™re not watching those scopes, someone else eventually will.

A word about developer experience

Letโ€™s be real. Developers arenโ€™t asking for more security tools, policies, or friction. What they want is clarity, especially if it helps them stay out of the next breach postmortem. Thatโ€™s why visibility-first approaches work. When security teams show developers exactly what access exists, and why it matters, the conversation shifts from โ€œWhy are you blocking me?โ€ to โ€œThanks for the heads-up.โ€

Modern ISPM platforms that prioritize access intelligence and transparency make this collaboration possible. By surfacing access risks in GitHub, and mapping them to real-world OAuth scopes, users, and repos, these tools give developers the context they need without slowing them down.

This isnโ€™t about controlling developers. Itโ€™s about making risk visible, actionable, and easy to fix before it shows up on the front page.

Get ahead of the next identity-linked attack

As the GitHub OAuth campaign demonstrated, credentials are no longer the only gateway. Identity is the new perimeter, and that perimeter extends deep into the developer stackโ€”beyond traditional IAM controls and into OAuth scopes, CI/CD pipelines, and service connections.

Itโ€™s time to bring platforms like GitHub into your identity security strategy.ย ISPMย offers the framework to do just that, combining access visibility with posture management across human and non-human identities.

This isnโ€™t just a GitHub issue, but a wake-up call for every security team managing modern infrastructure. If it has access, it has risk. Identity-first security isnโ€™t optional anymoreโ€”itโ€™s foundational.

โ€”

New Tech Forum provides a venue for technology leadersโ€”including vendors and other outside contributorsโ€”to explore and discuss emerging enterprise technology in unprecedented depth and breadth. The selection is subjective, based on our pick of the technologies we believe to be important and of greatest interest to InfoWorld readers. InfoWorld does not accept marketing collateral for publication and reserves the right to edit all contributed content. Send all inquiries toย doug_dineley@foundryco.com.

Taylor Parsons
by Taylor Parsons
Contributor

Harrison โ€œTaylorโ€ Parsons is a cybersecurity professional with over 15 years of experience in security operations, risk management, and technical leadership. As part of the Security & Trust organization at Veza, he focuses on internal security, strengthening security posture and compliance. With expertise in Threat Intelligence, endpoint security, SIEM, attack surface management, and incident response, Taylor brings a deep understanding of securing modern environments.