Possibility of restoring a repository after a serious policy violation (malware/security risk)? #183606
Replies: 3 comments
-
|
Based on GitHub’s enforcement history and Acceptable Use Policies, restoration is possible but not guaranteed, and for malware-related violations it is relatively uncommon. GitHub treats repositories that intentionally distributed malicious code (stealers, backdoors, viruses, etc.) as severe violations, even if the malicious content was later removed. In most cases, deleting releases or cleaning the current codebase does not fully negate the original violation, because the risk to users already existed. That said, GitHub does sometimes allow a second chance under very limited circumstances, usually when: The user fully acknowledges responsibility (no denial or minimization), The malicious content was removed completely (including history and releases), The project has legitimate, non-harmful value on its own, Trust & Safety determines the risk is fully neutralized. Even in those situations, the more common outcome is that: The original repository remains permanently disabled, but The user account stays in good standing and the user is allowed to create a new, clean repository from scratch. So realistically: Permanent takedown of the repository is the default outcome for intentional malware distribution. Restoration is rare, but not impossible. Your transparency and acknowledgment will help your account standing, even if the repo itself is not reinstated. At this point, the best approach is to wait for the Trust & Safety team’s decision and be prepared to rebuild the project in a new repository if needed. |
Beta Was this translation helpful? Give feedback.
-
|
Hi hillelkingqt, Thanks for your transparency—it takes courage to own up to past mistakes. Here’s an honest overview of how GitHub typically handles situations like this: 1. Severity of the initial violationGitHub treats malicious code in repositories very seriously, especially anything that could harm users’ systems (viruses, credential stealers, ransomware, etc.). Even if the malicious code is removed, GitHub keeps a record of violations. 2. Possibility of a “second chance”
3. Likely outcomes
4. Recommended steps
|
Beta Was this translation helpful? Give feedback.
-
|
Fact, that people trust and dowload your open source code and you in turn switch on webcam on underaged people goes to show you are just simply a disgusting person. I hope Github never re-instates your account. I am also looking at legal possibilities of your actions. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Question
Body
Hi everyone,
I’m looking for some honest feedback regarding a repository of mine that was recently suspended.
To be completely transparent: when I started this project about six months ago, I made a very poor and immature decision to include malicious functionality (essentially a virus/stealer) within the releases. I was exploring things I shouldn't have, and I deeply regret the potential risk I caused to users.
A few months ago, I realized how wrong this was. I completely removed all the malicious code, deleted all previous releases, and tried to clean up the project to ensure it was safe and provided only the intended utility. Despite this, GitHub recently flagged the repo—likely due to the historical data or reports about those past versions.
I am a GitHub Pro user and I have submitted an appeal, explaining that the current codebase is clean and that I’ve learned a massive lesson about responsibility and ethics in software development.
My question is: Given the severity of the initial violation, does GitHub ever allow a 'second chance' if the user can prove the current project is safe and the harmful parts are gone? Or is a violation of this nature usually a permanent ban for the repository?
I appreciate any honest answers, even if they aren't what I hope to hear.
Beta Was this translation helpful? Give feedback.
All reactions