Fork Commit Detector

Detect potential imposter commits in GitHub repositories

Paste a GitHub commit URL or enter owner/repo @ sha

Try it with known fork commits

actions/checkout @ 70379aad... Fork commit
aquasecurity/trivy @ 1885610c... Fork commit
aquasecurity/setup-trivy @ 8afa9b9f... Fork commit

Fork commits vs. imposter commits

A fork commit is a technical state: a commit that exists in GitHub's object store but is not in any branch of the repository you're referencing. Due to Git's cross-fork object sharing, commits pushed to any fork become accessible via the parent repository's namespace.

An imposter commit describes intent: using a fork commit to masquerade as part of a trusted repository. Reference one in a CI/CD pipeline (uses: owner/repo@sha) and GitHub fetches it—no merge or review required.

Not all fork commits are malicious. Legitimate scenarios include unmerged PR commits, abandoned branches, or force-pushed history. But the potential for abuse makes them worth investigating.

SITF: Imposter Commits (T-V002)
Chainguard: What the fork?
kernel.org: Cross-fork object sharing is not a bug
StepSecurity: The warning everyone ignores
Truffle Security: Deleted repo data

Real-world incidents & research