Linus Torvalds’ GitHub Prank Exposes a Fake‑Commit Vulnerability

On January 25 Linus Torvalds posted a joking README in the Linux GitHub repository that claimed to delete Linux, which turned out to be a demonstration of a “fake‑commit” vulnerability that lets attackers host arbitrary files via special URLs without appearing in the commit history.

ITPUB
ITPUB
ITPUB
Linus Torvalds’ GitHub Prank Exposes a Fake‑Commit Vulnerability

On January 25, Linus Torvalds submitted a prank README to the official Linux GitHub repository (https://github.com/torvalds/linux/tree/8bcab0346d4fcf21b97046eb44db8cf37ddd6da0) with the title “delete linux because it sucks”. The file claims the Linux source has been removed and even recommends using Windows XP.

“Hello, I am Linus Torvalds, the famous author of Linux. You can check the repo URL and the file header to verify it’s really me. I deleted Linux because I hate it and think it’s terrible. You should use this great operating system called Windows XP.”

The prank is harmless because the actual Linux source code was not deleted. Careful observers noticed that the README contains a link to a Hacker News discussion that describes a GitHub “fake‑commit” vulnerability, which allows publishing arbitrary content at URLs such as

https://github.com/my/project/blob/<faked_commit>/README.md

. These pages do not appear in the repository’s commit log or any branch, making them invisible except through the specific URL.

Screenshot of the prank README URL
Screenshot of the prank README URL

Normal commits include the word “commit” in the URL (e.g., .../commit/abcd1234), whereas the fake‑commit URLs omit this keyword. The prank README’s URL follows the fake pattern, and the file does not appear in the commit history, confirming the exploit.

Comparison of normal and fake commit URLs
Comparison of normal and fake commit URLs

The same vulnerability can be combined with another GitHub issue—email address impersonation—allowing an attacker to replace the author’s email in commits. An example repository (https://github.com/slimsag/linux/tree/5895e21f3c744ed9829e3afe9691e3eb1b1932ae#linux-kernel) appears to show Linus Torvalds as a contributor, but the email address was swapped, and the forged profile shows no activity.

Side‑by‑side comparison of forged and real Linus profiles
Side‑by‑side comparison of forged and real Linus profiles

These GitHub vulnerabilities were publicly disclosed in 2020, but the platform has not patched them, leaving them exploitable for creating convincing phishing pages.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

information securityGitHubSecurity VulnerabilityLinus Torvaldsfake commit
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.