Or worse: the content is still there, but subtly wrong. Links point to malware. Pages have been replaced with rants. Contributors are locked out by a single rogue maintainer who changed the team’s SSH keys at 2 a.m.
Treat your wiki like code. Audit it. Back it up. And never assume the person holding the keys today will be the one you trust tomorrow. corrupt wiki github
P.S. If your project’s wiki just went dark, check the repo’s network graph. Someone probably forked it before the corruption. That fork might be your new bible. Or worse: the content is still there, but subtly wrong
A GitHub wiki is not a set-it-and-forget-it knowledge base. It’s a Git repo with an attractive UI wrapper—and like any repo, it can be nuked, poisoned, or kidnapped. Contributors are locked out by a single rogue
They’re just separate Git repos ( repo.wiki.git ). That’s powerful—you can clone, fork, and audit history. But it also means anyone with write access to the main repo (or wiki-specific perms) can rewrite history, delete pages, or push propaganda.
Unlike Wikipedia’s built-in moderation, a GitHub wiki often has . If they go bad, get hacked, or sell out, there’s no emergency button.
Then one day: 404.