May 19, 2026
DNS or DNotSafe?
My domain got abused on GitHub Pages
A simple website owner got blindsided after strangers used his web address for scam pages — and the comments were ruthless
TLDR: A developer discovered scammers had used part of his website address for fake pages because his settings sent every sub-page to GitHub Pages. Commenters split between blaming GitHub for weak ownership checks and blaming the site owner for leaving the door wide open.
This story hit the internet like a slow-motion tech horror clip: one developer came back from traveling with weak internet to discover that random scam pages had apparently moved into part of his website address while he was away. The site owner thought he was just sending his whole address over to GitHub Pages, a free service for hosting simple websites. Instead, because he had set things up too broadly, strangers were able to claim sub-pages under his domain and use them for shady junk like slot-machine scams. The real gut punch? He only found out because Google emailed him about a “new owner.”<br><br>But the comments absolutely stole the show. One camp was sympathetic but blunt: GitHub should make people prove they own a web address before letting them use it. As one commenter basically put it, “why not just require a TXT record,” which is internet-speak for a simple ownership check. The other camp came in with full tough-love energy: this is on you, boss. Several commenters roasted the setup, saying that sending every sub-page to a platform you don’t control and assuming it would “probably check” was practically an engraved invitation for abuse.<br><br>The mood was half cautionary tale, half comment-section pile-on. One person claimed this kind of weakness has been known for around a decade, which made the whole thing feel less like a shocking new exploit and more like the internet equivalent of leaving your front door wide open. Brutal? Yes. Useful? Also yes.
Key Points
- •The author discovered an unexpected subdomain owner notification for kafka.immersivepoints.com through Google Search Console.
- •The article attributes the issue to a wildcard DNS configuration that pointed all subdomains of immersivepoints.com to GitHub Pages.
- •The author says another party was able to configure the subdomain on GitHub Pages using a repository CNAME entry, apparently from a private repository.
- •The abused subdomain was used to host scam slot-machine pages, according to the author.
- •After reporting the pages to GitHub, the author found GitHub documentation describing custom domain verification for GitHub Pages user sites.