https://help.github.com/articles/managing-deploy-keys#deploy...
If the attacker has a bunch of tokens, could they have bulk downloaded source code before the oAuth stuff was revoked by Circle?
https://github.com/blog/1270-easier-builds-and-deployments-u...
Info have a Circle-CI deploy key per private repository (which I will revoke).
https://help.github.com/articles/managing-deploy-keys#deploy...