A number of Travis CI users appear to have had Travis CI tokens revoked by Github in response to suspicious activity surrounding token.
Travis themselves have still not issued any notice or acknowledged this incident so it's worth letting the community know if they weren't already aware.
From memory, this will be the second breach in 2022 (https://blog.aquasec.com/travis-ci-security) in addition to last year's secret exposure (https://arstechnica.com/information-technology/2021/09/travi...)
---
A sampling of users on Twitter who have run into this issue:
https://twitter.com/peter_szilagyi/status/160059327410805555...
https://twitter.com/yaqwsx_cz/status/1600599797118996491
https://twitter.com/samonchain/status/1600611567606775808
https://twitter.com/dzarda_cz/status/1600613369408634886
https://twitter.com/samonchain/status/1600611567606775808
---
An example notice being sent out by Github (in lieu of Travis themselves taking any action):
> Hi {username}
> We're writing to let you know that we observed suspicious activity that suggests a threat actor used a Personal Access Token (PAT) associated with your account to access private repository metadata.
> Out of an abundance of caution, we reset your account password and revoked all of your Personal Access Tokens (classic), OAuth App tokens, and GitHub App tokens to protect your account, {username}.