<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>InfoQ - DevSecOps - News</title>
    <link>https://www.infoq.com</link>
    <description>InfoQ DevSecOps News feed</description>
    <item>
      <title>Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk</title>
      <link>https://www.infoq.com/news/2026/01/aws-github-vulnerability/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=DevSecOps-news</link>
      <description>&lt;img src="https://res.infoq.com/news/2026/01/aws-github-vulnerability/en/headerimage/generatedHeaderImage-1768930305529.jpg"/&gt;&lt;p&gt;AWS recently published a security bulletin acknowledging a configuration issue affecting some popular AWS-managed open-source GitHub repositories. Dubbed CodeBreach, the critical vulnerability could have resulted in the introduction of malicious code and hijacking of the repositories leveraging AWS CodeBuild.&lt;/p&gt; &lt;i&gt;By Renato Losio&lt;/i&gt;</description>
      <category>Cloud Security</category>
      <category>AWS</category>
      <category>Cloud</category>
      <category>github</category>
      <category>Continuous Delivery</category>
      <category>Security Vulnerabilities</category>
      <category>Common Vulnerabilities and Exposures</category>
      <category>DevSecOps</category>
      <category>DevOps</category>
      <category>Development</category>
      <category>news</category>
      <pubDate>Sun, 25 Jan 2026 07:28:00 GMT</pubDate>
      <guid>https://www.infoq.com/news/2026/01/aws-github-vulnerability/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=DevSecOps-news</guid>
      <dc:creator>Renato Losio</dc:creator>
      <dc:date>2026-01-25T07:28:00Z</dc:date>
      <dc:identifier>/news/2026/01/aws-github-vulnerability/en</dc:identifier>
    </item>
  </channel>
</rss>
