I just received this email from Github:
-----
Hi there,
During the course of regular auditing, GitHub discovered that a recently introduced bug exposed a small number of users’ passwords to our internal logging system, including yours. We have corrected this, but you'll need to reset your password to regain access to your account.
GitHub stores user passwords with secure cryptographic hashes (bcrypt). However, this recently introduced bug resulted in our secure internal logs recording plaintext user passwords when users initiated a password reset. Rest assured, these passwords were not accessible to the public or other GitHub users at any time. Additionally, they were not accessible to the majority of GitHub staff and we have determined that it is very unlikely that any GitHub staff accessed these logs. GitHub does not intentionally store passwords in plaintext format. Instead, we use modern cryptographic methods to ensure passwords are stored securely in production. To note, GitHub has not been hacked or compromised in any way.
You can regain access to your account by resetting your password using the link below::
https://github.com/password_reset
If you have any lingering questions or concerns about this, don't hesitate to let us know. You can reach us by emailing support@github.com or by using our contact form:
https://github.com/contact
Thanks,
GitHub Support
Despite my initial irritation, it's hard to fault them here, they had many other paths they could've chosen. I suspect many companies, upon determining the bug leaked information internally only in a relatively secure place, would've decided to just delete the offending logs and go on with their day.