Anatomy of a Breach

Anatomy of a Breach: Twitch — The Entire Source Code, Streamer Earnings, and Internal Tools Leaked in a 128GB Torrent

> series: anatomy_of_a_breach —— part: 154 —— target: twitch —— data: 128GB —— contents: source_code_earnings_internal_tools<span class="cursor-blink">_</span>_

Hedgehog Security 31 October 2021 12 min read

128GB. The entire source code. Streamer earnings. Internal tools. Posted on 4chan.

On 6 October 2021, an anonymous user posted a 128GB torrent to 4chan containing what appeared to be the entirety of Twitch's internal code and data. The leak included Twitch's complete source code repository (with commit history), internal tools and services, an unreleased Amazon Game Studios project codenamed 'Vapor' (a Steam competitor), proprietary SDKs, and — the detail that generated the most public attention — the complete payout data for Twitch's top streamers, revealing that the platform's highest earners received millions of dollars annually.

Twitch confirmed the breach and attributed it to a server misconfiguration that allowed unauthorised access to its internal systems. The company stated that user passwords were not exposed (they were hashed with bcrypt) and that full credit card numbers were not stored on Twitch's systems. However, the exposure of the entire source code — including security-related code — enabled attackers to identify vulnerabilities in Twitch's codebase. Twitch reset all stream keys as a precautionary measure. The leak was labelled 'part one' by the leaker, though no subsequent parts were published.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

When your entire codebase is public, every vulnerability is findable.

Source Code Enables Vulnerability Discovery
With Twitch's entire source code public, anyone can audit it for vulnerabilities — and not all auditors are well-intentioned. The exposure of source code dramatically reduces the effort required to find exploitable vulnerabilities. This parallels the <a href="/blog/anatomy-of-a-breach-adobe">Adobe source code theft</a> (2013) and the <a href="/blog/anatomy-of-a-breach-hacking-team">Hacking Team leak</a> (2015). Our <a href="/penetration-testing/web-application">application testing</a> identifies vulnerabilities that source code exposure would reveal.
Streamer Earnings Exposed
The publication of individual streamer earnings — revealing that top creators earned $1M-$10M annually — caused significant personal and professional disruption for affected streamers. Financial data, even when it reveals earnings rather than debts, can create safety risks including targeted extortion and social engineering.
Server Misconfiguration
Twitch attributed the breach to a server misconfiguration — the same root cause behind the <a href="/blog/anatomy-of-a-breach-microsoft-250m">Microsoft 250M exposure</a> (2020), <a href="/blog/anatomy-of-a-breach-ecuador">Ecuador</a> (2019), and the <a href="/blog/anatomy-of-a-breach-mongodb-ransomware">MongoDB wave</a> (2017). Configuration is security. Our <a href="/penetration-testing/cloud-configuration-review">cloud configuration reviews</a> identify misconfigurations before attackers find them.
bcrypt Saved the Passwords
Twitch's use of bcrypt for password hashing meant that user passwords were not directly compromised — a security success that limited the breach's impact on end users. Proper password hashing saves users even when everything else fails. Our <a href="/penetration-testing/web-application">application testing</a> verifies password storage implementation.

Configuration is security. Source code is a crown jewel. Protect both.

The Twitch breach reinforced two fundamental principles: first, server and cloud misconfigurations continue to be the most common root cause of major data exposures — from MongoDB (2017) through Microsoft (2020) to Twitch (2021). Second, source code is a crown-jewel asset whose exposure enables further attacks. Both require continuous verification through testing.

Cloud configuration reviews identify misconfigurations. Application testing identifies the vulnerabilities that source code exposure would reveal. Cyber Essentials mandates secure configuration. SOC in a Box monitors for data exfiltration and configuration changes. And UK Cyber Defence provides incident response when source code or sensitive internal data is exposed.


Twitch's entire source code leaked through a misconfiguration. Are your crown jewels protected?

<a href="/penetration-testing/cloud-configuration-review">Cloud reviews</a> find misconfigurations. <a href="/penetration-testing/web-application">Application testing</a> identifies vulnerabilities. <a href="/cyber-essentials">Cyber Essentials</a> mandates secure configuration.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles