← Back to SOC feed Coverage →

GitHub Repo switched from private to public

kql MEDIUM Azure-Sentinel
T1213
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-04-24T09:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may convert private GitHub repositories to public to exfiltrate sensitive data or distribute malicious code by exploiting public visibility. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential data leaks or malware distribution channels.

KQL Query


GitHubAudit
| where Action == "repo.access"
| where OperationType == "MODIFY"
| where Visibility == "PUBLIC" 
| project TimeGenerated, Action, Actor, Country, Repository, Visibility

Analytic Rule Definition

id: a6e2afd3-559c-4e88-a693-39c1f6789ef1
name: GitHub Repo switched from private to public
description: |
  'This hunting query identifies GitHub activites where a repo was changed from private to public that may be a sign of compromise.'
requiredDataConnectors: []
tactics:
  - Collection
relevantTechniques:
  - T1213
query: |

  GitHubAudit
  | where Action == "repo.access"
  | where OperationType == "MODIFY"
  | where Visibility == "PUBLIC" 
  | project TimeGenerated, Action, Actor, Country, Repository, Visibility

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/GitHub/Repository Permission Switched to Public.yaml