How to protect spam bot attacks in Discussion? #121439
-
Select Topic AreaQuestion BodyLast week we experience a massive spam attack in our discussion: https://github.com/orgs/dbeaver/discussions We cannot block spam bots by reporting every single one to GitHub (new ones created faster than we block them). DBeaver is a popular community with thousands of users. But we will have to close discussions completely next week. Is there any other possibility? |
Beta Was this translation helpful? Give feedback.
Replies: 11 comments 7 replies
-
|
One thing you could try is tightening up your account creation process, like adding email verification or CAPTCHAs. Another option might be using automated spam detection tools, although they might not catch everything. |
Beta Was this translation helpful? Give feedback.
-
|
@serge-rider, Admins can also block/ban individual users in the "comment options" dropdown; it also has an option to delete or hide all of that users posts (batch) to save time. |
Beta Was this translation helpful? Give feedback.
-
|
We are also suffering from this problem in our organization's discussions. I had to change all categories to the "Announcement" type to prevent users from posting. I am now painstakingly deleting thousands of posts one by one. |
Beta Was this translation helpful? Give feedback.
-
|
FYI folks, we have escalated this internally. I can't share timeline or make promises on their behalf, but the team responsible for mitigating GitHub-wide spam is aware of this new abuse vector and is prioritizing it alongside other GitHub-wide abuse vectors. |
Beta Was this translation helpful? Give feedback.
-
|
Any updates on this? We're a newish 22k ⭐️ repo, and getting phishing/malware comments on every single new issue created. Pattern:
Github has become our biggest risk vector for users |
Beta Was this translation helpful? Give feedback.
-
|
@jricciardi @LiteBrite82 https://github.com/microsoft/vscode-discussions/discussions/ is being badly affected by this problem. It would help if repo owners could block access from GH accounts that are "new" or that don't have an established reputation of non-recent contributions to other repos. |
Beta Was this translation helpful? Give feedback.
-
|
The issue is seen in winget-cli repo too: https://github.com/microsoft/winget-cli/issues?q=is%3Aissue%20state%3Aopen%20author%3Amindmasterzonk These spam bots create ticket immediately after account creation it seems. |
Beta Was this translation helpful? Give feedback.
-
|
Hi @jricciardi @LiteBrite82 we're seeing this as well (newish repo - ~22k stars). Our PR's are being spammed. Any help here would be appreciated Examples - |
Beta Was this translation helpful? Give feedback.
-
|
One thing you could try is tightening up your account creation process, like adding email verification or CAPTCHAs. Another option might be using automated spam detection tools, although they might not catch everything. |
Beta Was this translation helpful? Give feedback.
-
How to protect against spam bot attacks in GitHub DiscussionsGitHub provides several built-in tools to reduce and control spam in Discussions, but there is no single “anti-spam switch”. Protection works best when you combine multiple controls. 1️⃣ Restrict who can create discussionsYou can limit participation to trusted users. Path: Options include:
This is the most effective way to stop bot-created discussions. 2️⃣ Use moderation toolsFor existing spam:
Hidden comments remain invisible to the public but preserved for moderation review. 3️⃣ Require account maturity (implicit protection)GitHub automatically limits actions for:
This protection is automatic and not configurable, but it helps reduce bot spam. 4️⃣ Disable links and markdown abuse (manual enforcement)Most spam relies on links. As a moderator:
5️⃣ Use GitHub Actions for monitoring (advanced)While Actions cannot block posts directly, they can:
Example use cases:
6️⃣ Add clear community rulesCreate a pinned discussion like:
Clear rules reduce repeat abuse and justify moderation actions. 7️⃣ Disable Discussions temporarily (last resort)If spam becomes unmanageable: |
Beta Was this translation helpful? Give feedback.
FYI folks, we have escalated this internally. I can't share timeline or make promises on their behalf, but the team responsible for mitigating GitHub-wide spam is aware of this new abuse vector and is prioritizing it alongside other GitHub-wide abuse vectors.