Wiz Uses AI to Find GitHub Critical Bug

Wiz published detailed findings related to CVE-2026-3854, a high-severity (8.8) vulnerability in GitHub's git infrastructure, according to The Register. Reporting says the flaw allowed remote attackers to gain full read/write access to private GitHub repositories using a single command. The Register reports Wiz researchers used Claude Code and automated tooling including IDA MCP to accelerate analysis, moving from idea to a working exploit in under 48 hours. Wiz's blog is quoted in The Register: "By leveraging AI-augmented tooling, particularly automated reverse engineering using IDA MCP, we were able to do what was previously too costly." The Register also reports Wiz stands to receive a significant bug-bounty payout for the discovery.
What happened
Wiz published technical findings tied to CVE-2026-3854 (8.8), which The Register reports allowed remote attackers to obtain full read/write access to private GitHub repositories via a single command. The Register says Wiz disclosed the vulnerability this week and published a writeup describing the flaw in GitHub's handling of push option metadata across internal services.
Technical details
Per The Register's coverage of Wiz's writeup, the bug stems from how user-supplied push option values were incorporated into internal metadata separated by a null-byte delimiter. That metadata was forwarded between GitHub's internal services in X-Stat HTTP headers, and user input could be crafted to influence server behavior across the multi-service pipeline. The Register reports Wiz has a reproducible exploit and detailed analysis in its disclosure.
What the researchers used
The Register reports Wiz researchers relied on Claude Code and automated reverse-engineering tooling including IDA MCP to accelerate analysis. The Register quotes Wiz's blog: "By leveraging AI-augmented tooling, particularly automated reverse engineering using IDA MCP, we were able to do what was previously too costly." The Register also reports the team moved from concept to working exploit in less than 48 hours.
Editorial analysis
Industry observers have increasingly documented that AI-assisted program analysis and automated reverse engineering can compress months of manual work into days. This pattern both raises the operational tempo for defensive security research and lowers the barrier for attackers who adopt similar tooling.
Context and significance
For security practitioners, a high-severity flaw that yields full repository read/write is material: exposure of private code, secrets, and CI/CD configurations can cascade into supply-chain and credential compromise. The broader significance reported here is methodological-the story illustrates how generative and code-specialized models are being integrated into vulnerability discovery workflows.
What to watch
- •Whether GitHub provides an expanded post-mortem and mitigation timeline in its own advisories.
- •Further public writeups or PoCs that replicate the exploit pathway described in Wiz's disclosure.
- •How bug-bounty programs and disclosure policies evolve in response to faster discovery techniques.
Scoring Rationale
A high-severity GitHub infrastructure vulnerability that grants full private-repo access is highly relevant to security and infrastructure teams. The added dimension that AI-assisted tools accelerated the find raises operational and defensive implications for practitioners.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problems
