<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>GitHub on The Coders Blog</title><link>https://thecodersblog.com/tag/github/</link><description>Recent content in GitHub on The Coders Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 06 May 2026 16:59:53 +0000</lastBuildDate><atom:link href="https://thecodersblog.com/tag/github/index.xml" rel="self" type="application/rss+xml"/><item><title>Bun: The Fast JavaScript Runtime Continues Its Ascendancy</title><link>https://thecodersblog.com/bun-javascript-runtime-2026/</link><pubDate>Wed, 06 May 2026 16:59:53 +0000</pubDate><guid>https://thecodersblog.com/bun-javascript-runtime-2026/</guid><description>&lt;p&gt;Tired of the endless build steps, the glacial &lt;code&gt;npm install&lt;/code&gt; times, and the constant juggling of disparate tools to get your JavaScript project off the ground? You&amp;rsquo;re not alone. The JavaScript ecosystem, for all its innovation, has often been weighed down by complexity. Enter Bun.&lt;/p&gt;
&lt;h3 id="the-core-problem-javascript-toolchain-bloat"&gt;The Core Problem: JavaScript Toolchain Bloat&lt;/h3&gt;
&lt;p&gt;For years, JavaScript developers have relied on Node.js, a robust but sometimes verbose runtime, coupled with separate bundlers (Webpack, Rollup), test runners (Jest, Mocha), and package managers (npm, Yarn). This fragmentation leads to configuration headaches, slower development cycles, and a steeper learning curve. Projects balloon with dependencies, and simple tasks become an exercise in orchestrating multiple tools. The promise of a unified, fast, and developer-friendly JavaScript experience has remained elusive, until recently.&lt;/p&gt;</description></item><item><title>GitHub Incidents: Analyzing Recurring Security Challenges</title><link>https://thecodersblog.com/github-security-incident-response-2026/</link><pubDate>Tue, 05 May 2026 16:22:30 +0000</pubDate><guid>https://thecodersblog.com/github-security-incident-response-2026/</guid><description>&lt;p&gt;The recent CVE-2026-3854 RCE vulnerability served as yet another stark reminder: GitHub, the de facto hub for code, isn&amp;rsquo;t immune to recurring security failures. While the platform offers powerful tools for software development and increasingly for security, relying on it without a critical eye opens the door to persistent risks, particularly within the supply chain and the execution environments like GitHub Actions.&lt;/p&gt;
&lt;h3 id="the-core-problem-platform-level-vulnerabilities-and-user-defined-risk"&gt;The Core Problem: Platform-Level Vulnerabilities and User-Defined Risk&lt;/h3&gt;
&lt;p&gt;GitHub&amp;rsquo;s incident response playbook, while standard, is increasingly tested by the complexity of its ecosystem. At its heart, the problem lies in the dual nature of its security. GitHub provides features like GitHub Advanced Security (GHAS) with Code Scanning (SAST), Secret Scanning, and Dependency Insights. However, the platform&amp;rsquo;s security is equally, if not more, dependent on user implementation and diligence. This reliance creates a fertile ground for misconfigurations and overlooked vulnerabilities, especially when dealing with the broad attack surface presented by GitHub Actions and third-party integrations.&lt;/p&gt;</description></item><item><title>Copilot Co-Authorship: New Standards for AI in Commit Messages</title><link>https://thecodersblog.com/github-commit-message-standards-for-ai-assistance-2026/</link><pubDate>Tue, 05 May 2026 15:17:36 +0000</pubDate><guid>https://thecodersblog.com/github-commit-message-standards-for-ai-assistance-2026/</guid><description>&lt;p&gt;The sudden appearance of &lt;code&gt;Co-authored-by: Copilot &amp;lt;copilot@github.com&amp;gt;&lt;/code&gt; in your Git history, without explicit consent or clear indication of &lt;em&gt;what&lt;/em&gt; was co-authored, is no longer a theoretical problem. It&amp;rsquo;s a stark reminder that the integration of AI into our development workflows demands formalization, transparency, and a clear chain of accountability. The recent shifts in how GitHub Copilot handles commit message attribution highlight a critical juncture: we must move beyond ad-hoc implementations to establish robust standards for AI co-authorship.&lt;/p&gt;</description></item><item><title>Beyond GitHub: Why Developers Still Dream of Owning Their Code Forge in 2026</title><link>https://thecodersblog.com/if-i-could-make-my-own-github-2026/</link><pubDate>Fri, 01 May 2026 11:31:06 +0000</pubDate><guid>https://thecodersblog.com/if-i-could-make-my-own-github-2026/</guid><description>&lt;p&gt;For years, GitHub has been our comfortable digital home, but a growing unease whispers in the background: are we renting, or are we truly owning our most critical infrastructure?&lt;/p&gt;
&lt;p&gt;This isn&amp;rsquo;t about shunning collaboration; it&amp;rsquo;s about re-evaluating where our core development assets reside. The conversation about a &amp;ldquo;new forge&amp;rdquo; or a &amp;ldquo;self-hosted GitHub&amp;rdquo; isn&amp;rsquo;t merely academic in 2026; it&amp;rsquo;s a strategic imperative for many.&lt;/p&gt;
&lt;h2 id="the-shifting-sands-of-centralized-code-forges-and-why-were-uneasy"&gt;The Shifting Sands of Centralized Code Forges (and why we&amp;rsquo;re uneasy)&lt;/h2&gt;
&lt;p&gt;The undeniable convenience and network effect of platforms like &lt;strong&gt;GitHub&lt;/strong&gt;, &lt;strong&gt;GitLab.com&lt;/strong&gt;, and &lt;strong&gt;Bitbucket Cloud&lt;/strong&gt; are powerful. They offer instant access, shared tooling, and a vast ecosystem of integrations, making them the default choice for millions of developers and organizations. Yet, this very convenience masks a growing fragility.&lt;/p&gt;</description></item><item><title>Ghostty Exits GitHub: The Unspoken Costs of Centralized Open Source [2026]</title><link>https://thecodersblog.com/ghostty-s-departure-from-github-2026/</link><pubDate>Wed, 29 Apr 2026 11:11:31 +0000</pubDate><guid>https://thecodersblog.com/ghostty-s-departure-from-github-2026/</guid><description>&lt;p&gt;Another day, another GitHub outage. But this time, it&amp;rsquo;s pushed Ghostty, Mitchell Hashimoto&amp;rsquo;s terminal emulator, off the platform entirely, laying bare the true cost of centralized open-source infrastructure. This isn&amp;rsquo;t just an inconvenience; it&amp;rsquo;s a &lt;strong&gt;critical wake-up call&lt;/strong&gt; for the entire development community.&lt;/p&gt;
&lt;h2 id="ghosttys-exodus-a-canary-in-the-centralization-coal-mine"&gt;Ghostty&amp;rsquo;s Exodus: A Canary in the Centralization Coal Mine&lt;/h2&gt;
&lt;p&gt;Mitchell Hashimoto, known as GitHub user #1299, has been a bedrock of the platform since February 2008. For over &lt;strong&gt;18 years&lt;/strong&gt;, he&amp;rsquo;s committed daily to the ecosystem, pouring countless hours into open source projects, including his latest, Ghostty. His departure is anything but casual.&lt;/p&gt;</description></item><item><title>GitHub.com RCE: Unpacking CVE-2026-3854's Critical Impact on Developers 2026</title><link>https://thecodersblog.com/github-rce-vulnerability-cve-2026-3854-breakdown-2026/</link><pubDate>Wed, 29 Apr 2026 11:01:29 +0000</pubDate><guid>https://thecodersblog.com/github-rce-vulnerability-cve-2026-3854-breakdown-2026/</guid><description>&lt;p&gt;GitHub.com, the backbone of modern software development, just revealed a critical Remote Code Execution (RCE) vulnerability, &lt;strong&gt;CVE-2026-3854&lt;/strong&gt;, that allowed authenticated users to hijack backend servers with a single &lt;code&gt;git push&lt;/code&gt;. This isn&amp;rsquo;t just another security advisory; it&amp;rsquo;s a stark reminder of the delicate trust we place in our foundational development platforms.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="the-alarm-bell-unpacking-cve-2026-3854s-core-threat"&gt;The Alarm Bell: Unpacking CVE-2026-3854&amp;rsquo;s Core Threat&lt;/h2&gt;
&lt;p&gt;A critical RCE flaw, assigned a &lt;strong&gt;CVSS score of 8.7&lt;/strong&gt;, was recently unearthed by the diligent security researchers at Wiz. This vulnerability didn&amp;rsquo;t target a peripheral service; it shook the very foundations of GitHub&amp;rsquo;s internal Git infrastructure, the engine that powers every &lt;code&gt;git clone&lt;/code&gt;, &lt;code&gt;git pull&lt;/code&gt;, and critically, every &lt;code&gt;git push&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>Ghostty's Departure: Embracing Platform Independence 2026</title><link>https://thecodersblog.com/ghostty-is-leaving-github-2026/</link><pubDate>Wed, 29 Apr 2026 01:51:18 +0000</pubDate><guid>https://thecodersblog.com/ghostty-is-leaving-github-2026/</guid><description>&lt;p&gt;Ghostty, the fast and feature-rich terminal emulator, is officially departing GitHub. Mitchell Hashimoto, a long-time GitHub user and the creator of Ghostty, announced this significant move on April 28, 2026, articulating a profound disillusionment with the platform. This decision, though described as &amp;ldquo;irrationally sad&amp;rdquo; by Hashimoto, stems from a core belief that GitHub &amp;ldquo;is not a fun place for me to be anymore&amp;rdquo; and impedes his ability to &amp;ldquo;get work done&amp;rdquo; and &amp;ldquo;ship software.&amp;rdquo; While Ghostty plans to maintain a read-only mirror on GitHub, the core development will transition to a new, yet-to-be-disclosed platform. This shift transcends a single project&amp;rsquo;s re-platforming; it signals a growing undercurrent in the developer community towards platform independence, re-evaluating centralized code hosting, and embracing self-hosted or federated alternatives.&lt;/p&gt;</description></item></channel></rss>